PROTECTING YOUR RESEARCH

 

 

student_encryption.jpg 

 

 

On the surface, it may not seem that protecting your research data is a high priority.  But if you lost that data, or if someone else began using the data that you worked so hard to accumulate - would you feel differently?

The Office of Information Technology offers the following software and strategies to help you protect your research data.

ENCRYPTION

Data encryption is a process of securing computer files by instituting safeguards that make the files unreadable to everyone except for the holder of the encryption key. Data encryption is required on all university-owned laptops and certain desktops.

Encryption of UTSA-owned Computers

Desktop Computers.

All High Risk Desktop Computers owned, leased, or controlled by the University must be Password protected and encrypted using methods approved by the Institution’s Information Security Officer.

All desktop computers purchased after September 1, 2013 must be Password protected and encrypted using methods approved by the Institution’s Information Security Officer before their deployment.

Laptop Computers and Other Mobile Devices. 

All laptop computers and other mobile devices, including but not limited to mobile and smart phones, and tablet computers that are owned, leased, or controlled by the University, must be encrypted using methods approved by the Institution’s Information Security Officer.

USB thumb drives and similar removable storage devices owned, leased, or controlled by the University must be encrypted before storage of any Confidential University Data on the device.

UTSA-Approved Encryption Tools

There are various data encryption software applications available. The Office of Information Security supports a variety of software applications for laptop encryption, including BitLocker and File Vault 2.

To have encryption software installed on a UTSA-owned laptop, submit your request through OITConnect, oitconnect.utsa.edu.  

 

cloud_backup.jpg 

 

SAVING AND BACKING UP YOUR DATA 

 

SAVING YOUR DATA 

The only approved location for Category I data is the I: Drive.  If your research data includes Category I HIPAA or FERPA data, it must be saved to the I: Drive.

 

BACKING UP YOUR DATA (CrashPlan Pro)

UTSA uses CrashPlan Pro to back up the data on all computers designated as Primary Workstations.  If you need CrashPlan installed on your computer, contact OITConnect, oitconnect.utsa.edu.

 

 

virus.jpg

 

PROTECTION AGAINST MALWARE

 

ANTIVIRUS SOFTWARE

Antivirus software protects computers from malicious software ("malware").  Without antivirus software, an unprotected computer could be compromised within minutes of connecting to the Internet.

 

Malware can steal passwords, delete files and infect other computers or computer networks.  No matter what type of computer you have, it must be protected by antivirus software.

 

All Windows-based university-owned computers are protected by a Microsoft antivirus software product.  When a computer is set up (or "imaged"), antivirus software is loaded as part of the installed package.

 

Computers running Mac OS X that are imaged by OIT Support Services include System Center Endpoint Protection for Macs.

<< Back