Educause Security Discussion mailing list archives

Re: Laptop encryption- Follow-up


From: James Farr '05 <jfarr () UTICA EDU>
Date: Tue, 16 Nov 2010 12:20:48 -0500

We are rolling this out for Faculty and Staff.  We are trying to educate
users about confidential information.  At the same time we know some people
need this information as part of their job responsibilities.  We also
acknowledge mistakes happen.

Right now we are looking at 3 options
Option 1, Make 2 folders on every flash drive protected and unprotected.
Allow the user to select which folder they are putting information into.
Option 2, Encrypt only new data written to the drive
Option 3, Encrypt all data written to the drive, including existing data

We have not encountered a scenario where we would allow someone to opt out
of encryption, but I am sure there will be one person.  If we find a machine
that absolutely cannot have encryption on it I would require a program like
Identity Finder make sure the user understands what type of data can and
cannot be stored on the machine.  I like your idea of a waiver. We have not
installed the server or local software. In the next month or two we will be
deciding on how to balance the policies. 

James Farr
Utica College

-----Original Message-----
From: The EDUCAUSE Security Constituent Group Listserv
[mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Patria, Patricia
Sent: Tuesday, November 16, 2010 12:00 PM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: Re: [SECURITY] Laptop encryption- Follow-up

For those that responded to the encryption thread noting that you are using
Whole Disk Encryption for portable devices, would you mind sharing which
group this applies to? Is it just your staff members? Or faculty as well?

We are in the process of rolling out Bitlocker whole disk encryption to all
staff with laptops, but are planning to allow faculty to opt out of
Bitlocker if they sign a waiver stating that they do not store sensitive
data on their laptop per our Data Classification Policy. Is anyone doing
something similar?

From a breach standpoint, if the individual signs a waiver and states that
they do not have any sensitive information on their computer, do you employ
other controls like Identity Finder or DLP software to ensure that is the
case? Or is their signed waiver enough?

Any feedback, or examples of how you address lost/stolen devices from a
breach standpoint, is appreciated. Thank you. 

Patty


Patty Patria
Bentley University
 


Current thread: