What are the options for fulfilling the requirement of having encryption on laptops and high-risk desktops?
Last Updated 2009/07/08 ISU will coordinate with Departments and SOM Partner IT groups to determine how best to implement Encryption. • Departments can choose to have ISU manage the entire encryption process. • Departments can encrypt all their systems internally using their own IT Staff and resources. If departments perform their own encryption, ISU will provide guidance, including standard operating procedures, to support project success. ISU will need to provide quality assurance assessment to verify the department’s IT staff has completed the task as per guidelines and is audit-worthy. This work, although expected to be nominal will be recharged to each department.