{"id":99,"date":"2013-06-04T12:27:54","date_gmt":"2013-06-04T16:27:54","guid":{"rendered":"http:\/\/blog.uvm.edu\/whysecurity\/?p=99"},"modified":"2013-06-04T12:38:58","modified_gmt":"2013-06-04T16:38:58","slug":"what-is-encryption-and-why-should-i-care","status":"publish","type":"post","link":"https:\/\/blog.uvm.edu\/whysecurity\/2013\/06\/04\/what-is-encryption-and-why-should-i-care\/","title":{"rendered":"What is encryption, and why should I care?"},"content":{"rendered":"<p>Encryption protects the people whose information we collect and manage, while protecting UVM from significant liability.<\/p>\n<p>Encryption encodes information in a way that only someone knowing a secret key can read it. If you store sensitive or confidential information \u2014 what UVM calls &#8220;Protected University Information&#8221;[1] \u2014 anywhere but on password-protected UVM servers, it must be encrypted. Laptops, smartphones, iPads, tablets, and even USB drives can be encrypted, often quite easily and conveniently.\u00a0 The encryption requirement applies to backups and &#8220;temporary&#8221; storage as well.\u00a0 For example, an external hard drive must be encrypted if it is used to transfer files containing Protected University Information from an old computer to a new one.<\/p>\n<p>Need help? Contact the ISO Team at iso@uvm.edu.<\/p>\n<p>[1] See UVM&#8217;s Information Security Policy: http:\/\/www.uvm.edu\/policies\/cit\/infosecurity.pdf<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Encryption protects the people whose information we collect and manage, while protecting UVM from significant liability. Encryption encodes information in a way that only someone knowing a secret key can read it. If you store sensitive or confidential information \u2014 what UVM calls &#8220;Protected University Information&#8221;[1] \u2014 anywhere but on password-protected UVM servers, it must &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/blog.uvm.edu\/whysecurity\/2013\/06\/04\/what-is-encryption-and-why-should-i-care\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;What is encryption, and why should I care?&#8221;<\/span><\/a><\/p>\n","protected":false},"author":252,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-99","post","type-post","status-publish","format-standard","hentry","category-uncategorized","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Dean","author_link":"https:\/\/blog.uvm.edu\/whysecurity\/author\/djw\/"},"_links":{"self":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts\/99","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/users\/252"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/comments?post=99"}],"version-history":[{"count":8,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts\/99\/revisions"}],"predecessor-version":[{"id":109,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts\/99\/revisions\/109"}],"wp:attachment":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/media?parent=99"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/categories?post=99"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/tags?post=99"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}