Disk Encryption Policy
Version 2.1
Purpose
This policy establishes requirements for using disk encryption technologies on the University’s IT Resources to protect the confidentiality of information.
Scope
This IT policy, and all policies referenced herein, shall apply to all members of the Fordham IT staff (the “User(s)” or “you”) who use, access, or otherwise employ, locally or remotely, the University’s IT Resources, whether individually controlled, shared, stand-alone, or networked.
Policy Statement
- Laptops, desktops, and servers are required to employ full disk encryption regardless of their intended use or the data stored on them.
- You are required to employ encryption for all Fordham Sensitive and Fordham Protected data regardless of the medium (e.g., USB, external hard drive, cloud storage).
- Users may obtain the encryption software from Information Security and Assurance (ISA) or use other ISA-approved encryption software.
- Users must not attempt to disable, remove, or otherwise tamper with the encryption software.
- Since some countries have encryption import and use restrictions, check with the U.S. Department of State before traveling with encrypted IT Resources internationally to ensure that you have the most up-to-date information or consult with the ISA if you have questions.
- Many nations do not recognize a personal use exemption1.
- Before traveling to these countries with an encrypted laptop, you may need to apply to their specified governmental agency for an import license.
- Additional information about international encryption controls and personal use exemption can be found at the following websites:
1Several countries negotiated rules to facilitate traveling with encryption software known as the Wassenaar Arrangement. One provision allows a traveler to freely enter a participating country with an encrypted device under a personal use exemption as long as the traveler does not create, enhance, share, sell or otherwise distribute the encryption technology while visiting.
Definitions
Encryption involves the process of transforming data so that it is unreadable by anyone who does not have a decryption key.
Full disk encryption (FDE), also known as whole disk encryption, is the process of encrypting all the data on the hard drive(s) on a computer, including the computer’s OS, and permitting access to the data only after successful authentication.
IT Resources include computing, networking, communications, application, telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and any related materials and services.
Related Policies and Procedures
Review Frequency | Biennial |
---|---|
Responsible Person | Senior Director, IT Security Operations and Assurance |
Approved By | CISO |
Approval Date | August 30, 2018 |
Version | Date | Description |
---|---|---|
1.0 | 08/30/2018 | 08/30/2018 |
2.0 | 01/16/2020 | Updated policy statement |
2.1 | 02/11/2021 | Updated policy statement |
Policy Disclaimer Statement
Deviations from policies, procedures, or guidelines published and approved by Information Security and Assurance (ISA) may only be done cooperatively between ISA and the requesting entity with sufficient time to allow for appropriate risk analysis, documentation, and possible presentation to authorized University representatives. Failure to adhere to ISA written policies may be met with University sanctions.