{"id":31296,"date":"2017-02-10T18:40:57","date_gmt":"2017-02-10T23:40:57","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/encryption-information-technology-services.php"},"modified":"2017-02-10T18:40:57","modified_gmt":"2017-02-10T23:40:57","slug":"encryption-information-technology-services","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/encryption-information-technology-services.php","title":{"rendered":"Encryption | Information Technology Services"},"content":{"rendered":"<p><p>    This InfoCenteris a collection of    resourcesaboutencryption for stored    informationonportable devices, such as    laptops, tablets, and externally attachedstorage.    (Refer to SSL certificates in the Related InfoCenters box    forinformation related toencrypted network    communications.) The Help Desk provides general support    for Windows BitLocker and for OSX FileVault2 full disk    encryption.Questionsshould normally be handled by a    departmental IT support person, and if necessary willbe    escalated to the InformationSecurity &    PolicyOffice or the ITS Enterprise Client Management    team.  <\/p>\n<p>    Encryption is a method to protect digital information,    byscrambling it as it travels across the Internet, or    scrambling it when the information is \"at rest\"or stored    on our computers. This ensures that only authorized users can    decrypt (un-scramble) the information and use it.    Encryption enhances the privacy and confidentiality, as well as    the integrity and authenticity of our information. It helps us    keep our information safe.  <\/p>\n<p>    Portable devices such as laptops, tablets, and USB storage are    most at risk for being misplaced or stolen. If a device is lost    or stolen, encryption prevents unauthorized users from    accessing data stored locally on the device. Without    encryption, unauthorized users canuse various techniques    to bypass the accounts and permissions in order to access the    localdrive contents.  <\/p>\n<p>    In order to meet our legal obligations and our responsibility    to protect the privacy of those we serve, The University of    Iowa requires full disk encryption to be implemented    onall university owned mobile computing devices    (i.e.laptops,tablets, USBstorage). The best    way to avoid theft or lossof sensitive data is to    keepit in a secure file storage offering such as    OneDrive, RDSS,or department shared drives, where it's    physically secured and regularly backed up. Then,you can    easily access the information remotelyfrom your mobile    computer. However, encryption is oursafety net for    new files,temporary (cached) files, and other information    that is stored on a mobile device.  <\/p>\n<p>    The Verizon 2015 Data Breach Investigations Report    indicates15% of all security incidents involved some form    of physical loss or theft.  <\/p>\n<p>    Everyone uses network encryption today: over https    connections from your browser to a website, over cellular    phone-to-tower communications, and also over wireless networks    that require a login or connection password, such as Eduroam,    in order to protect the privacy of communications. Full    disk encryption is similarly designed to protect information    when its stored.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More:<br \/>\n<a target=\"_blank\" href=\"https:\/\/its.uiowa.edu\/encryption\" title=\"Encryption | Information Technology Services\">Encryption | Information Technology Services<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> This InfoCenteris a collection of resourcesaboutencryption for stored informationonportable devices, such as laptops, tablets, and externally attachedstorage. (Refer to SSL certificates in the Related InfoCenters box forinformation related toencrypted network communications.) The Help Desk provides general support for Windows BitLocker and for OSX FileVault2 full disk encryption.Questionsshould normally be handled by a departmental IT support person, and if necessary willbe escalated to the InformationSecurity &#038; PolicyOffice or the ITS Enterprise Client Management team<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-31296","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31296"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=31296"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31296\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=31296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=31296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=31296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}