Information Technology Division
Computing & Communications Center

Archive - Guidelines for Encryption of Sensitive Information

Purpose

The purpose is to reduce the risk of a data exposure attributed to a WPI breach.

Background

Encrypting sensitive information increases overall information security, mitigates some financial risk and meets compliance guidelines for state and federal regulations. By reducing the risk of a breach we reduce an individual’s risk of data exposure which could expose one to identify theft. WPI’s financial risk is also reduced by not having security breaches which could result in adverse negative publicity, adversely impact WPI’s competitive advantage, and break non-disclosure & other legal agreements.

Data encryption has become a standard by the Commonwealth of Massachusetts Consumer and Business Regulation Division to protect personally identifiable information.

NOTE: This is an interim guideline pending a more complete solution made available and deployed by the WPI Information Technology Division. Followers of this guideline should expect other additional solutions will be made available.

Scope

The scope includes portable devices storing sensitive information. Portable devices include, but are not limited to, the following equipment.

Guidelines

Questions and Help

For assistance, contact the Information Security Office at itsecurity@wpi.edu.


Revision:

December 2, 2008: The Information Technology Division endorsed this standard.

Maintained by itweb
Last modified: Oct 13, 2009, 20:48 UTC
[WPI] [CCC] [Top]