Table of Contents:

Introduction

This procedure outlines the requirements for encrypting data on all University of Waterloo-owned devices. This measure is essential to protect sensitive information and maintain the integrity and confidentiality of University data.

Scope

This procedure applies exclusively to University-owned devices, including but not limited to workstations (laptops and desktops), servers, phones, mobile devices, and fixed data drives.  It does not extend to personally-owned devices used by employees for accessing University data. However, all individuals are responsible for the security of information to which they have access, regardless of the ownership of the device being used to access it.

Roles and Responsibilities

Employees

Employees who do not use workstations managed by IST or Faculty IT teams are responsible for the encryption implementation and compliance assurance of their devices.

Information Security Services team (ISS)

IST Workstations team

Faculty IT teams

Faculty IT teams who do not leverage services of the IST Workstations team are responsible for the encryption implementation and compliance assurance of workstations they manage. 

Procedure Details

Data Encryption Requirements

Exception Handling

Implementation Procedures

Procedure Enforcement

Recommended Encryption Methods

The following are recommended encryption methods for various platforms.  For help enabling encryption on your device, personal or University-owned, reach out via the IST Service Portal

Windows devices

BitLocker: BitLocker provides full-disk AES encryption and is integrated into the operating system. 

macOS Devices

FileVault: File Vault offers full-disk AES encryption and is integrated into the operating system. 

iOS Devices

Built-in Encryption: iOS devices have built-in encryption that is automatically enabled when you set a passcode. It is important to ensure that all iOS devices have a passcode set to maintain encryption. 

Android Devices

Built-in Encryption: Most modern Android devices come with encryption enabled by default. For devices where encryption is not enabled, it can typically be turned on in the security settings. It’s important to set a secure lock screen (PIN, pattern, or password) to activate the encryption.

 

Related articles appear here based on the labels you select. Click to edit the macro and add or change labels.

Need help?

Contact the IST Service Desk online or 519-888-4567 ext. 44357.

Article feedback

If you’d like to share any feedback about this article, please let us know.