You are here

Encryption of devices

Printer-friendly versionPrinter-friendly version

The following is a policy of the College of Science and Engineering.

The use of sensitive data (HR information, student data, grant proposals, exam papers etc.) is widespread at work and in our personal lives (bank accounts etc). Theft of such data is an increasing problem and the University is taking action to reduce this risk to its and personal data, while minimising the effect on our ability to perform our roles. Implementation requires action by the University, and by you. Please read the following because your assistance is essential. If you have any questions about implementation then please contact the School's IT support team.

The measures below apply to all who use sensitive data. Practical advice can be found at the foot of this page.

  1. You are required to secure all devices (e.g. mobile phone or tablet) however owned, if you use these for work, or have work access credentials stored on them. Ideally, you should use the advanced security features. Should your device not support security then we deprecate its use for University business and recommend that you talk to your local IT support team to discuss alternative approaches.
  2. You are required to configure a remote wipe facility on all your smartphones and tablets, irrespective of ownership, if you use these for work, or have work access credentials stored on them. Should your device not support remote wipe then we deprecate its use for University business and recommend that you talk to the School's IT support team as above.
  3. We strongly recommend that you configure a remote wipe capability on all your smartphones and tablets, even if you do not use these for University business, as it will protect your personal data in the event of loss. The University will provide support on how to install this on the most common platforms.
  4. The College intends that all University owned laptops and desktops should be encrypted. All new devices will be encrypted now, where currently possible (e.g. the Managed Windows desktop). The College is working towards extending this to other operating systems (e.g. MacOS, Linux).

    Users who have chosen to self-manage their laptop or desktop are expected to encrypt their devices. Where users are prevented from encrypting devices (e.g. PCs attached to experimental equipment supported by 3rd parties), please discuss appropriate protections with your School IT support.

  5. We strongly recommend that you encrypt all your laptops and desktops, irrespective of ownership and use, as this will protect personal and University data. The University will provide support and guidance on how to achieve that on the most common platforms. If your laptop or desktop cannot be encrypted then we deprecate its use for University business and recommend that you talk to your local IT support team.

Practical advice

Last reviewed: 
18/09/2015

System Status

Home dirs (AFS)
Network
Mail
Other services
Scheduled downtime

Choose a topic