Workstation hard drive encryption policies require all connected storage to be encrypted so that data cannot be accessed from a computer without the proper keys or user authentication. Encryption policies apply to both Windows and Mac computers and are managed by ITS.
Looking for help with a locked computer or encrypting an external/USB drive? |
|
Encryption is the process of converting or scrambling data and information into an unreadable, encoded version that can only be read with authorized access. Encryption is a widely used security tool that can prevent the interception of sensitive data, either while stored in files or while in transit across networks. |
Encryption on Cal Poly devices is performed using native tools for each major operating system:
Each technology is managed by different external tools and controlled by ITS. |
Once a device is encrypted, it requires either an authenticated login or a recovery key. When a device is initially encrypted, a recovery key is created and saved to the management server. |