It is always a good idea to encrypt your data, and with modern computing devices, enabling full disk encryption is usually a very simple process. However, in some cases encrypting data can be costly and may require considerable effort. While we strongly recommend that you always encrypt your data, the choice to do so is yours. Here is some guidance:
Encryption enhances the trustworthiness of the data
Preserving data integrity is becoming more and more important. Keeping data encrypted except when in work protects it against malicious and non-malicious modification. Clicking on the link in the previous sentence will take you to a recipe on how to ensure data integrity through a research workflow.
When encryption is a requirement
Encryption is often a requirement for sensitive data, for instance in the following cases:
- If you are working with regulated data where the encryption is required either by law or by IU policy, such as PHI
- If the data you are working with is subject to a contract, data use agreement, IRB approval, etc that requires encryption
- If you are working with institutional data that is classified as critical data
When encryption is difficult or impossible
In certain, very limited cases, encryption may not be possible on a system, in which case other mitigating controls can be used to ensure the data is protected. In cases such as this where sensitive data is involved, the system and the mitigating controls in place must be approved by the relevant parties. Depending on the circumstance, the relevant parties could include the Office of Research Compliance (ORC), Institutional Review Board (IRB), University Information Policy Office (UIPO), or the Data Stewards. If you would like assistance reviewing your use of encryption, or assessing compensating controls, please contact us at securemyresearch@iu.edu
Directions
- For instructions on encrypting your data, use the related articles and search function below for instructions depending on what type of system you are using.
Email securemyresearch@iu.edu if you have other questions about cybersecurity or compliance relating to your research project.
Insert excerpt |
---|
| How do I secure my own environment? |
---|
| How do I secure my own environment? |
---|
nopanel | true |
---|
|