CUMC Home | Columbia University | Jobs at CUMC | Contact CUMC | Find People
     
For support: call extension 5-Help (212-305-4357) or email us
 
 
Encryption
 

Approved Encryption

Equipment and encryption methods listed here will help CUMC employees meet security requirements. In brief:

  • Endpoints used at CUMC must be registered and encrypted. These include desktop and laptop computers, smartphones, and tablets, etc.
  • Removable Media (USB flash drives, etc.) linked below have been approved by CUMC IT
Additional information on obtaining or using equipment and encryption are linked where possible. When setting up or using a method, be sure that you or your IT staff have verified that any applicable policy requirements (example: selecting a strong password, using a minimum 256 bit encryption cipher key) are being met.

If there are others not listed below that you would like to use, make sure they comply with Acceptable Usage of Information Resources, Registration and Protection of Endpoints, or other relevant policies, and contact CUMC Information Security for approval.


Equipment Options Use
USB Flash Drives
Hardware based self encrypting
  • Temporary storage of small to medium amounts of data
  • Transporting files between computers
Desktop and Laptop Computers
Full drive encryption
  • Computers used by those conducting CUMC work or study
  • Semi-permanent and temporary storage of data
Smartphones and Tablets
Full drive encryption
  • Devices used by those conducting CUMC work or study
  • Temporary storage of data
Email Attachments
Individual file encryption
  • Transporting small files via email
  • Automatic encryption between CUMC Exchange accounts
  • Secure Gateway is required to encrypt files sent to non-approved OHCA accounts
  • Other encryption programs or passwords must not be used on attached files
Network Drives
Full drive encryption
  • Permanent, temporary and back up storage of large amounts of data
  • Individual or collaborative sharing of data within department(s)
External Drives
Hardware based full drive encryption
  • Semi-permanent and temporary storage of large amounts of data
  • Transporting files between computers
Other Removable Storage
CD/DVDs, individual file encryption
  • Temporary storage of small to medium amounts of data
  • Transporting files between computers
  • Collaborative work - unique password can be set on file(s) for sharing
  • Do not use to encrypt or password protect email attachments; use Secure Email instead

| TOP |

Last updated 10/04/2017