According to the Ponemon Institute, 600,000 laptops are lost or stolen at US airports every year. The consequences of unencrypted, lost data include fines, identity theft, compromised research data, endangered federal grant status, loss of commercialization properties, erosion of alumni and donor trust, and risk to the reputation and image of the organization.

UCM BSD Information Security Office Encryption Presentation

What is Encryption?

  • Uses a mathematical function to scramble data
  • Prevents access to data from unauthorized parties

Why should you Encrypt?

  • Electronic devices are lost and stolen daily from home, car and work
  • Information stored on these devices can be used to:
    • Steal your identity
    • Tarnish the University’s reputation
    • Sold to others online

What should you Encrypt?

  • Laptops
  • E-mails
  • USB flash drives
  • Mobile devices (Jamf Pro/Casper)

When should you Encrypt?

  • Using your device for work-related activities
  • Emailing sensitive information (e.g. PHI, PII, SSN etc.)
  • Information that no one else but you or those that you trust should see

How to Encrypt your devices?

Click on the icons below to see how to encrypt your devices and/or e-mail.




Flash_imagesUSB Devices







BSD information security logo

© 2021 The University of Chicago

All rights reserved

Privacy Statement TBD