Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Purpose

Encryption encodes information in such a way that unauthorized parties should be unable to read it. This helps to prevent compromises to the confidentiality and integrity of your data and is a part of robust, multi-layered security approach. Whether it is a compromised desktop, or a lost mobile or storage devices, encryption ensures that your data remains accessible to only you and your team.


Audience

Status
titlefaculty
Status
colourBlue
titleresearchers
Status
colourRed
titleAdmin staff
Status
colourPurple
titleIT staff
Status
colourGreen
titlestudents


On this page

Expand
titleExpand to view table of contents.
Table of Contents
minLevel1
maxLevel34
include
outlinefalse
indent
styledefault
excludePurpose|Audience|On this page|Search|Additional help|Related articles
typelist
class
printablefalse

Initial considerations

Note

Not all encryption algorithms are the same. AES-128 bit (or equivalent) is the absolute minimum you should consider. AES-256 bit or greater is preferred.

Determine your data's classification.

  • Classifying your data is the first step to knowing what safeguards are required to securely store your data.

    • Classify data

    • Level 3 and level 4 data must be stored on a secure server or must be encrypted at rest on a laptop, mobile device, or removeable storage.

Consult with your local IT group.


What can I do?

Enable or install full-disk encryption packages.

Windows (institutionally managed)

.

Windows (self-managed)

.

MacOS (self-managed)

.

Linux (self-managed)

.

Android (self-managed)

.

iOS (self-managed)

.

Cross-platform

.

Encrypt at the file or folder level.

Info

ZIP files can be transferred across platforms.

Windows

.

MacOS

.

Linux

.

Cross-platform

.

Use a self-encrypting device (SED).

Servers

.

  • Where possible, order SED storage drives and motherboards supporting Trusted Platform Module (TPM).

Storage

.


Page Properties
hiddentrue

Name

Role

Date

Michael Laurentius

Author

Carl Chan

Approver (Manager)

Reviewer

Live Search
spaceKeyISH
sizelarge
additionalpage excerpt
placeholderHow do I...
typepage
labelskb-how-to-article,kb-general-concepts,kb-spec-how-to-article


Additional help

General

https://uoft-infosec-cf.atlassian.nethandbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/AdditionalContact+help#%F0%9F%9B%A1%EF%B8%8F-Informationus#Information-Security-(IS)

https://uoft-infosec-cf.atlassian.nethandbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/AdditionalContact+help#%F0%9F%96%A5%EF%B8%8F-Informationus#Information-Technology-(IT)

Researchers

https://security.utoronto.ca/services/research-information-security-program/


Filter by label (Content by label)
showLabelsfalse
maxCheckboxfalse
showSpacefalse
reversefalse
excerptTypesimple
cqllabel in ( "encrypt" , "secure" ) and title !~ "encrypt"