This site requires JavaScript to be enabled

Encryption: FAQ

200 views

 

Use this document to find FAQ on Encryption.


What devices need to be encrypted?

Desktops (as rebuilt or replaced), laptops (ASAP) and backup devices/media (ASAP) that may be used to handle University private sensitive information.

How do we identify which computers access PSI?

Refer to the function of the office and/or user of the device and their typical business activities.  Consult with University Data Stewards about expected users.  Identity Finder scan results may reveal users who have accessed some categories of sensitive data.

What tools are provided by USU to encrypt devices?

USU administers a central Active Directory Domain which will facilitate the use of BitLocker to comply with these requirements.   Encryption tools require careful management to insure that encryption keys are adequately protected from loss or exposure.

Where can I learn how to use and manage encryption tools?

The IT Service Desk has detailed instructions in the ServiceNow Knowledge Base for using BitLocker on the central domain.  Additional instructions for other options will be group-sourced from the combined experience and recommendations of desktop support staff from across the University.

Where do I store encryption keys?

The IT Service Desk has detailed instructions in the ServiceNow Knowledge Base for using BitLocker on the central domain.  Additional instructions for other options will be group-sourced from the combined experience and recommendations of desktop support staff from across the University.

Where can I learn how to use and manage encryption tools?

The IT Service Desk has detailed instructions in the ServiceNow Knowledge Base for using BitLocker on the central domain.  Additional instructions for other options will be group-sourced from the combined experience and recommendations of desktop support.

What are my auditing responsibilities on encrypted systems?

Initially, self-reporting of compliance will be expected for each office that might store or access private sensitive data.

What are implementation costs?

 

Related Articles

 

Review the article Encryption @USU for more information regarding policies, guidelines, and instructions for enabling encryption.

 


For further assistance, please contact your Department IT Support or the IT Service Desk