Due to their size and mobility, laptops are easy to lose and easy to steal. It is everyone’s responsibility to protect and secure data stored on these devices from unauthorized or unintentional data exposure. By encrypting and protecting all university-owned laptops, Texas State is adopting an industry best practice that lessens the risk of data exposure without the need to determine if confidential information was present on a missing laptop. In other words, if we can prove that the data was protected, we can be sure that the data does not get into the wrong hands. Furthermore, with device encryption, we can remotely remove protected data from the device as well.
In a 2010 study, 46 percent of lost laptops contained confidential data, only 30 percent of those systems were encrypted, and only 10 percent had other anti-theft technologies (See The Billion Dollar Lost Laptop Study PDF, Ponemon Institute and Intel Corp). According to the FBI and the insurance institutes, laptop computers are the number one stolen item in the United States with approximately 1,800 stolen per day across the country.
Additionally, the Texas State Laptop Encryption Program will address State of Texas mandates found in the Texas Administrative Code, Title 1, Part 10, Chapter 202, Subchapter C, Rule §202.75 and UPPS 04.01.01: Security of Texas State Information Resources.
Reduce the risk of university confidential data exposure through stolen or lost equipment. Implement full-disk encryption solutions that meets industry and State of Texas Administrative Code (TAC 202) standards.
|Windows Laptops||Mac Laptops|
McAfee Endpoint Encryption
Both McAfee Endpoint Encryption and FileVault 2 are enabled when at rest, provide minimal impact to the laptop owner, and are highly rated in the encryption industry.
Note: Other operating systems that are not Windows or Mac-based (e.g., Linux), must have an approved Texas State Device Encryption Exception Request form on file with ITAC.
All new computer replacement program (CRP) laptops will be encrypted prior to delivery.
Anyone who purchases a department-funded laptop must contact ITAC to have the laptop encrypted or have an approved Texas State Device Encryption Exception Request form on file. Where applicable, ITAC will involve the department’s technical support person (TSP) to aid in software installation, encryption set up, and end-user training.
In an effort to encrypt as many laptops as possible, ITAC will undergo the below initial laptop encryption effort:
Protecting data via laptop encryption is everyone's responsibility.
After the first round of laptop encryption is complete, it will be the responsibility of the laptop owner and the department inventory account manager to ensure that all laptops are encrypted and stay encrypted or have an approved Texas State Device Encryption Exception Request form on file.
Any new laptop that is added to an inventory list must have encryption on it to protect university and personal data or have an approved Texas State Device Encryption Exception Request form on file.
Approximate turnaround time: 3 business days
There is no charge for this service.
Note: Computers that are re-imaged or have a new operating system should follow the Encryption Re-image Process.