- » Account Request
- » Alumni Account Request
- » Calendar Request
- » Access Request
- » Disk Quota Increase
- » Exiting Employee
- » Request Forms and Processes
(ITS Staff only)
Encryption is the transformation of data into a form unreadable by anyone without the secret decryption key. Its purpose is to ensure confidentiality and privacy by keeping the information hidden from anyone for whom it is not intended. For example, one may wish to encrypt files on a hard drive to prevent an intruder from reading them. When an entire hard disk is encrypted, that data is protected if the computer is lost or stolen. Encryption can also be used to protect sensitive files that are sent through email or sensitive communications sent over the network.
Strong encryption is the term we use to describe the minimum strength of encryption appropriate for use with Level 1 protected data. Strong encryption is 256-bit encryption and complies with ICSUAM Policy Information Security Asset Management Section 8065: Information Security Asset Management, Standard 8065.S0.
There is one important thing to remember about any encryption process: it is either extremely difficult or completely impossible to decrypt encrypted data if the password is lost.
Follow the instructions on the appropriate individual program page linked from the Encryption Overview page on the ITS website. Please be sure to consult with your ITC, the Technology Help Desk at (707) 826-HELP (4357), or the Information Security Office at (707) 826-3815.
Procedures, Guidelines, Other: