Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

It is always a good idea to encrypt your data, and with modern computing devices, enabling full disk encryption is usually a very simple process. However, in other some cases , encrypting data can be costly and may require considerable effort. While we strongly recommend that you always encrypt your data, the choice to do so often comes down to whether encryption is required or not. To answer this question, encryption is required is yours.  Here is some guidance:

Encryption enhances the trustworthiness of the data

Preserving data integrity is becoming more and more important.  Keeping data encrypted except when in work protects it against malicious and non-malicious modification.  Clicking on the link in the previous sentence will take you to a recipe on how to ensure data integrity through a research workflow.

When encryption is a requirement

Encryption is often a requirement for sensitive data, for instance in the following cases:

  • If you are working with regulated data where the encryption is required either by law or by IU policy, such as PHI
  • If the data you are working with is subject to a contract, data use agreement, IRB approval, etc that requires encryption
  • If you are working with institutional data that is classified as critical data

When encryption is difficult or impossible

In certain, very limited cases, encryption may not be possible on a system, in which case other mitigating controls must can be in place used to ensure the data is protected. In cases such as this where sensitive data is involved, the system and the mitigating controls in place must be approved by the relevant parties. Depending on the circumstance, the relevant parties could include the Office of Research Compliance (ORC), Institutional Review Board (IRB), University Information Policy Office (UIPO), or the Data Stewards. If you would like assistance reviewing your use of encryption, or assessing compensating controls, please contact us at securemyresearch@iu.edu

Directions

  1. For instructions on encrypting your data, use the related articles and search function below for instructions depending on what type of system you are using.


Email securemyresearch@iu.edu if you have other questions about cybersecurity or compliance relating to your research project.

Insert excerpt
How do I secure my own environment?
How do I secure my own environment?
nopaneltrue


Info
iconfalse
titleWe want your feedback

Please email securemyresearch@iu.edu to report errors/omissions and send critiques, suggestions for improvements, new use cases/recipes, or any other positive or negative feedback you might have.  It will be your contribution to the Cookbook and appreciated by all who use it.




Live Search
spaceKeySMR
sizelarge
additionalnone
placeholderSearch for another recipe
typepage
labelsrecipe

Filter by label (Content by label)
showLabelsfalse
max5
spacesTRUSTEDRI
showSpacefalse
sortmodified
reversetrue
typepage
cqllabel in ("encrypt","encryption","faq") and type = "page" and space = "SMR"
labelsmanage data longitudinal

Include Page
SMR Google Analytics
SMR Google Analytics