Encrypt confidential, sensitive, or high-risk information
To better protect the sensitive data that the University of Delaware collects, all computer files that contain confidential, sensitive, or high-risk information must be encrypted.
Encryption is the process of securing data so that it can only be used by those who should have access to it. If a computer is stolen or used by someone without permission, encrypted files and folders will be inaccessible.
- Do not store confidential information or PII on your computer or electronic devices if possible.
- Encrypt any confidential information that you must store.
- Use a strong password that is difficult or impossible to guess. Encryption only works if the password is kept secure.
Data encrypted using TrueCrypt or AxCrypt can be emailed and decrypted with a password. If encrypted confidential PII is emailed, the password should be sent separately so that if one email goes to the wrong address, no information will be compromised.
Encryption is natively supported on Windows Vista, Windows 7, Windows 8, and Mac OS X operating systems. After enabling native encryption, you should notice no change in your workflow. Information Technologies recommends that if you have sensitive data, store it in a single folder (Windows) or a single disk image (Macintosh) and encrypt the folder or disk image. This will help ensure that all confidential information is encrypted when not in use.
Recommended encryption tools
This cross-platform program creates an encrypted “container” that is password protected and mounts like a drive.
This software allows encrypted documents to be emailed to recipients who have TrueCrypt installed.
Most modern computers have a built-in encryption system which can include specific files or whole disk encryption.
AxCrypt allows Windows users to encrypt a file, encrypt and copy a file, or encrypt a file to an .exe file.
This software allows encrypted documents to be emailed and opened by recipients who DO NOT have AxCrypt.