Encrypting information renders it near useless to thieves and protects our clients, students, employees, and intellectual properties because:
- Data, in the traditional plural and abstract sense, do not convey meaning.
- Information happens when data convey meaning to you, including confidential and/or sensitive stuff like:
- Clinic, donor, and student identities and related matter
- Employee identities and evaluations
- Proprietary secrets
- Encryption software enables you to mask information as data and unmask data into information
- Press: Ctrl+Esc
- Type: C:
- Press: Enter
- Back-up all local, original work for all people who use this computer such as desktop files, bookmarks, "My Documents" files:
- Consider copying the data to a removable "thumb" or "flash memory" drive
- Consider trying out our new Windows back-up solution
- Secure your backed-up information from theft
- Bring your computer to campus on Wednesday
- Get all updates:
- Attach it to power because encrypting requires a lot of energy
- Attach it to the wired network so our systems can talk with each other
- Leave it running overnight and through Thursday so our systems can find, schedule, and update your computer (see notes below)
- By Friday, the system should work as noted in the next section.
- Testing shows it takes six to twelve hours to encrypt an entire computer.
- Encryption requires a lot of processing so expect it to run very slowly during that time and use a lot of energy.
- Testing shows you may close the lid or "sleep" the computer at any time to pause the encrypting process. Upon awakening the computer, the encrypting process automatically resumes.
- Boot your computer as normal
- Enter your PIN (see above) at the following screen:
- Use your computer as normal
- Initially, the boot pin does not exist.
- If BitLocker doesn't enable via our automated processes, CAS ITS will need to enable it manually.
- Contact our office if you need help.
- Contact our Service Desk to:
- Schedule a time to drop off your computer for a couple workdays.
- Back-up all locally-stored, original work.
- Bring your computer to GAB 313 with power cable
Once we have your computer, we plan to:
- Back it up as a courtesy (you remain responsible for local data!)
- Install the encryption software
- Encrypt the system
Getting Access When You Forget the PasswordIf you forget your password:
- Have another person (listed in the initial login screen) unlock the computer.
- Login to your account.
In some cases, encryption may cause substantial harm or pose unsuitable risk.
For such cases:
- CAS IT may independently determine or the user should provide CAS IT with:
- Reason why encryption may pose substantial or unsuitable risk
- Asset number for every laptop that falls under that justification
- Exception term (e.g., until May 2017)
- If CAS IT staff agrees, CAS IT staff will submit a ticket to UNT System IT Security with the above information.
- If UNT System IT Security agrees, they will authorize CAS IT staff to implement the exception.