Encrypt confidential, sensitive, or high-risk information

To better protect the sensitive data that the University of Delaware collects, all computer files that contain confidential, sensitive, or high-risk information must be encrypted.

Encryption is the process of securing data so that it can only be used by those who should have access to it. If a computer is stolen or used by someone without permission, encrypted files and folders will be inaccessible.


Guidelines


Data encrypted using TrueCrypt or AxCrypt can be emailed and decrypted with a password. If encrypted confidential PII is emailed, the password should be sent separately so that if one email goes to the wrong address, no information will be compromised.

Encryption is natively supported on Windows Vista, Windows 7, Windows 8, and Mac OS X operating systems. After enabling native encryption, you should notice no change in your workflow. Information Technologies recommends that if you have sensitive data, store it in a single folder (Windows) or a single disk image (Macintosh) and encrypt the folder or disk image. This will help ensure that all confidential information is encrypted when not in use.


Recommended encryption tools

TrueCrypt


This cross-platform program creates an encrypted “container” that is password protected and mounts like a drive.

This software allows encrypted documents to be emailed to recipients who have TrueCrypt installed.

Native encryption


Windows | Macintosh

Most modern computers have a built-in encryption system which can include specific files or whole disk encryption.

 

AxCrypt


AxCrypt allows Windows users to encrypt a file, encrypt and copy a file, or encrypt a file to an .exe file.

This software allows encrypted documents to be emailed and opened by recipients who DO NOT have AxCrypt.