During the summer of 2012, the Board of Regents of the University of Texas System established a mandate for the encryption of all laptops in the System after a serious data breach at one of the institutions. In the spring of 2013 the Board finalized the requirements for encryption of desktops across the System as well. Information Security worked with the departments at all schools to meet the May 2014 deadline for desktop encryption, and one of the most important steps the departments had to take was determining which systems would be encrypted, which would be exempted, and which would be retired.
Laptop and desktop encryption is designed to protect the university and its customers in the event a device is lost or stolen. If a department determines a device cannot or must not be encrypted, steps must be taken to ensure that device does not represent a threat to the university, and an encryption exemption must be requested. Desktop and laptop encryption exemptions must be approved by the Chief Information Security Officer (CISO). Exemptions are granted based on a justifiable, verifiable business case, including appropriate documentation. Any exemptions that are granted will be for a maximum of one year, must be reviewed for changing circumstances and must be renewed. Additionally, exemptions are considered on a per-device basis, with one request per device; bulk exemption requests will not be considered.
The overall encryption exemption process is as follows:
- Requester gathers and provides documentation justifying the exemption (see list below)
- Requester submits request for exemption using the online exemption request form.
- The Chief Information Security Officer (CISO) makes the decision
- The CISO communicates the decision
- Denial – notify the requester with an explanation for denial
- Approval – notify requester, assign expiration date