PS129 Encryption
PS129 Encryption
Purpose
Implications
Page 1 of 4
UTMB INFORMATION RESOURCES PRACTICE STANDARD Section 1 Subject 2 Security Management Data Transfers/Communications 02/28/2009 05/25/2012 -Effective -Revised
Practice Standard
If information that is considered to be confidential, such as PHI, SSNs, credit card, or other data classified as confidential by the data owner, traverses an un-trusted public network, such as the Internet, then the data shall be encrypted with at least 128-bit encryption. Options for encrypting data in transit include: a) Secure Socket Layers (SSL) which use public key cryptography to encrypt Web application sessions between the users browser and the Web server. The Web server must have a certificate that has been generated by a Public Key Infrastructure (PKI). Users browsers come pre-configured to trust the certificates of these well-known CAs, and browser client side certificates are not required. b) Virtual Private Networks (VPN) use software and/or hardware to encrypt data between participating networks, or clients and networks. IP Security (IPSec) increasingly is becoming the standard for providing authentication and encryption between sites. IPSec authentication is based on the exchange of keys between communicating devices. c) Public Key Infrastructure (PKI) - A PKI (public key infrastructure) enables users of a basically unsecured public network ,such as the Internet, to securely and privately exchange data through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. d) E-Mail e-mail systems can support some types of encryption. Major mail clients can support encryption natively using Transport layer security (TLS) or S/MIME. e) Documents The Microsoft Office Suite and the Adobe Portable Document Format have native encryption features that support algorithms up to 128 bits. f) Encrypted removable media hardware encrypted removable media support features including remote wiping and management features, such as key/file recovery and single-use access keys.
Page 2 of 4
UTMB INFORMATION RESOURCES PRACTICE STANDARD Section 1 Subject 2 Security Management Data Transfers/Communications 02/28/2009 05/25/2012 -Effective -Revised
Page 3 of 4
UTMB INFORMATION RESOURCES PRACTICE STANDARD Section 1 Subject 2 Security Management Data Transfers/Communications 02/28/2009 05/25/2012 -Effective -Revised
Disciplinary Actions
Violation of this policy may result in disciplinary action which may include termination for employees; a termination of employment relations in the case of contractors or consultants; or suspension or expulsion in the case of a student. Additionally, individuals are subject to loss of UTMB IR access privileges, civil and/or criminal prosecution.
Page 4 of 4
UTMB INFORMATION RESOURCES PRACTICE STANDARD Section 1 Subject 2 Security Management Data Transfers/Communications 02/28/2009 05/25/2012 -Effective -Revised
References
Texas Administrative Code, Chapter 202 The University of Texas System UTS-165 UTMB IR 2.19.6 - Acceptable Use of Information Resources UTMB IR 1.0.1 - IR Security Policy Approval Standards UTMB IR 1.0.2 - IR Security Management Practice Standards Approval Process
Page 5 of 4