<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://support.cs.jhu.edu/wiki/index.php?action=history&amp;feed=atom&amp;title=Category%3ADisk_Encryption</id>
	<title>Category:Disk Encryption - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://support.cs.jhu.edu/wiki/index.php?action=history&amp;feed=atom&amp;title=Category%3ADisk_Encryption"/>
	<link rel="alternate" type="text/html" href="https://support.cs.jhu.edu/wiki/index.php?title=Category:Disk_Encryption&amp;action=history"/>
	<updated>2026-04-10T01:53:35Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.6</generator>
	<entry>
		<id>https://support.cs.jhu.edu/wiki/index.php?title=Category:Disk_Encryption&amp;diff=4515&amp;oldid=prev</id>
		<title>Steve410.cs.jhu.edu at 15:28, 20 December 2017</title>
		<link rel="alternate" type="text/html" href="https://support.cs.jhu.edu/wiki/index.php?title=Category:Disk_Encryption&amp;diff=4515&amp;oldid=prev"/>
		<updated>2017-12-20T15:28:20Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 15:28, 20 December 2017&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l5&quot; &gt;Line 5:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 5:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Whiting School's central IT group (WSE) has put together an overview of JHU's disk encryption requirements at:  [http://wseit.engineering.jhu.edu/get-help/computer-hard-drive-encryption http://wseit.engineering.jhu.edu/get-help/computer-hard-drive-encryption]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Whiting School's central IT group (WSE) has put together an overview of JHU's disk encryption requirements at:  [http://wseit.engineering.jhu.edu/get-help/computer-hard-drive-encryption http://wseit.engineering.jhu.edu/get-help/computer-hard-drive-encryption]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;We provide &lt;/del&gt;guidance for implementing full-disk encryption on various systems on the following pages:&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Some &lt;/ins&gt;guidance for implementing full-disk encryption on various systems on the following pages:&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [[Linux Disk Encryption]]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [[Linux Disk Encryption]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Steve410.cs.jhu.edu</name></author>
	</entry>
	<entry>
		<id>https://support.cs.jhu.edu/wiki/index.php?title=Category:Disk_Encryption&amp;diff=4514&amp;oldid=prev</id>
		<title>Steve410.cs.jhu.edu at 15:27, 20 December 2017</title>
		<link rel="alternate" type="text/html" href="https://support.cs.jhu.edu/wiki/index.php?title=Category:Disk_Encryption&amp;diff=4514&amp;oldid=prev"/>
		<updated>2017-12-20T15:27:23Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 15:27, 20 December 2017&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;:&lt;/del&gt;JHU requires that anyone who stores &amp;quot;sensitive information&amp;quot; on their laptop must ensure that information is encrypted.  This includes, among other things, financial data, student records, employment records, social security numbers, other [https://en.wikipedia.org/wiki/Personally_identifiable_information ''personally identifiable information'' '''(PII)'''], and certain research data involving human subjects.  &lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;JHU requires that anyone who stores &amp;quot;sensitive information&amp;quot; on their laptop must ensure that information is encrypted.  This includes, among other things, financial data, student records, employment records, social security numbers, other [https://en.wikipedia.org/wiki/Personally_identifiable_information ''personally identifiable information'' '''(PII)'''], and certain research data involving human subjects.  &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;:&lt;/del&gt;Sensitive information might come from a variety of sources, including email sent to you. Consequently, we recommend that every computer used for Department work (administrative, class-related, research, or other) make use of full-disk encryption, especially if that computer ever resides in an unsecured environment (e.g. a laptop you ever take out of your office, or a desktop located in a room to which multiple people have access).&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Sensitive information might come from a variety of sources, including email sent to you. Consequently, we recommend that every computer used for Department work (administrative, class-related, research, or other) make use of full-disk encryption, especially if that computer ever resides in an unsecured environment (e.g. a laptop you ever take out of your office, or a desktop located in a room to which multiple people have access).&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Whiting School's central IT group (WSE) has put together an overview of JHU's disk encryption requirements at:  [http://wseit.engineering.jhu.edu/get-help/computer-hard-drive-encryption http://wseit.engineering.jhu.edu/get-help/computer-hard-drive-encryption]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Whiting School's central IT group (WSE) has put together an overview of JHU's disk encryption requirements at:  [http://wseit.engineering.jhu.edu/get-help/computer-hard-drive-encryption http://wseit.engineering.jhu.edu/get-help/computer-hard-drive-encryption]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Steve410.cs.jhu.edu</name></author>
	</entry>
	<entry>
		<id>https://support.cs.jhu.edu/wiki/index.php?title=Category:Disk_Encryption&amp;diff=4513&amp;oldid=prev</id>
		<title>Steve410.cs.jhu.edu at 15:27, 20 December 2017</title>
		<link rel="alternate" type="text/html" href="https://support.cs.jhu.edu/wiki/index.php?title=Category:Disk_Encryption&amp;diff=4513&amp;oldid=prev"/>
		<updated>2017-12-20T15:27:02Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 15:27, 20 December 2017&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;JHU requires that anyone who stores &amp;quot;sensitive information&amp;quot; on their laptop must ensure that information is encrypted.  This includes, among other things, financial data, student records, employment records, social security numbers, other [https://en.wikipedia.org/wiki/Personally_identifiable_information ''personally identifiable information'' '''(PII)'''], and certain research data involving human subjects. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;Sensitive information might come from a variety of sources, including email sent to you. Consequently, we recommend that every computer used for Department work (administrative, class-related, research, or other) make use of full-disk encryption, especially if that computer ever resides in an unsecured environment (e.g. a laptop you ever take out of your office, or a desktop located in a room to which multiple people have access).&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;:&lt;/ins&gt;JHU requires that anyone who stores &amp;quot;sensitive information&amp;quot; on their laptop must ensure that information is encrypted.  This includes, among other things, financial data, student records, employment records, social security numbers, other [https://en.wikipedia.org/wiki/Personally_identifiable_information ''personally identifiable information'' '''(PII)'''], and certain research data involving human subjects.  &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;:&lt;/ins&gt;Sensitive information might come from a variety of sources, including email sent to you. Consequently, we recommend that every computer used for Department work (administrative, class-related, research, or other) make use of full-disk encryption, especially if that computer ever resides in an unsecured environment (e.g. a laptop you ever take out of your office, or a desktop located in a room to which multiple people have access).&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Whiting School's central IT group (WSE) has put together an overview of JHU's disk encryption requirements at:  [http://wseit.engineering.jhu.edu/get-help/computer-hard-drive-encryption http://wseit.engineering.jhu.edu/get-help/computer-hard-drive-encryption]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Whiting School's central IT group (WSE) has put together an overview of JHU's disk encryption requirements at:  [http://wseit.engineering.jhu.edu/get-help/computer-hard-drive-encryption http://wseit.engineering.jhu.edu/get-help/computer-hard-drive-encryption]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Steve410.cs.jhu.edu</name></author>
	</entry>
	<entry>
		<id>https://support.cs.jhu.edu/wiki/index.php?title=Category:Disk_Encryption&amp;diff=2151&amp;oldid=prev</id>
		<title>Steve410.cs.jhu.edu at 17:53, 5 May 2016</title>
		<link rel="alternate" type="text/html" href="https://support.cs.jhu.edu/wiki/index.php?title=Category:Disk_Encryption&amp;diff=2151&amp;oldid=prev"/>
		<updated>2016-05-05T17:53:33Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 17:53, 5 May 2016&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;JHU requires that anyone who stores &amp;quot;sensitive information&amp;quot; on their laptop must ensure that information is encrypted.  This includes, among other things, financial data, student records, employment records, social security numbers, other [https://en.wikipedia.org/wiki/Personally_identifiable_information ''personally identifiable information'' '''(PII)'''], and certain research data involving human subjects.  Sensitive information might come from a variety of sources, including email sent to you. Consequently, we recommend that every computer used for Department work (administrative, class-related, research, or other) make use of full-disk encryption, especially if that computer ever resides in an unsecured environment (e.g. a laptop you ever take out of your office, or a desktop located in a room to which multiple people have access).&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;JHU requires that anyone who stores &amp;quot;sensitive information&amp;quot; on their laptop must ensure that information is encrypted.  This includes, among other things, financial data, student records, employment records, social security numbers, other [https://en.wikipedia.org/wiki/Personally_identifiable_information ''personally identifiable information'' '''(PII)'''], and certain research data involving human subjects.  Sensitive information might come from a variety of sources, including email sent to you. Consequently, we recommend that every computer used for Department work (administrative, class-related, research, or other) make use of full-disk encryption, especially if that computer ever resides in an unsecured environment (e.g. a laptop you ever take out of your office, or a desktop located in a room to which multiple people have access).&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Whiting School's central IT group (WSE) has put together an overview of JHU's disk encryption requirements at:  [http://wseit.engineering.jhu.edu/get-help/computer-hard-drive-encryption http://wseit.engineering.jhu.edu/get-help/computer-hard-drive-encryption]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;We provide guidance for implementing full-disk encryption on various systems on the following pages:&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;We provide guidance for implementing full-disk encryption on various systems on the following pages:&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Steve410.cs.jhu.edu</name></author>
	</entry>
	<entry>
		<id>https://support.cs.jhu.edu/wiki/index.php?title=Category:Disk_Encryption&amp;diff=2038&amp;oldid=prev</id>
		<title>Steve410.cs.jhu.edu: /* Disk Encryption Passphrases */</title>
		<link rel="alternate" type="text/html" href="https://support.cs.jhu.edu/wiki/index.php?title=Category:Disk_Encryption&amp;diff=2038&amp;oldid=prev"/>
		<updated>2016-03-03T16:00:48Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Disk Encryption Passphrases&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 16:00, 3 March 2016&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l9&quot; &gt;Line 9:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 9:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Disk Encryption Passphrases ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Disk Encryption Passphrases ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The passphrase for your disk should be something long enough that it cannot be guessed, even by a determined computer, but ideally something that you can remember.  &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;It &lt;/del&gt;should not be the same as your everyday password for your computer.  (It's okay to use the same passphrase for your disk encryption and your root/administrator account, assuming that you primarily use &amp;lt;tt&amp;gt;sudo&amp;lt;/tt&amp;gt; or similar privilege escalation tools rather than &amp;lt;tt&amp;gt;su&amp;lt;/tt&amp;gt; (or logging in as root/administrator) to work with administrative permissions.) &lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;If you need to write your passphrase down to remember it, keep it somewhere safe (e.g. your wallet) and protect it in the same way that you would protect the key to your office or home.  Do not store it anywhere near your computer.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;* &lt;/ins&gt;The passphrase for your disk should be something long enough that it cannot be guessed, even by a determined computer, but ideally something that you can remember.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;* &lt;/ins&gt; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Your passphrase &lt;/ins&gt;should not be the same as your everyday password for your computer.  (It's okay to use the same passphrase for your disk encryption and your root/administrator account, assuming that you primarily use &amp;lt;tt&amp;gt;sudo&amp;lt;/tt&amp;gt; or similar privilege escalation tools rather than &amp;lt;tt&amp;gt;su&amp;lt;/tt&amp;gt; (or logging in as root/administrator) to work with administrative permissions.)&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;* &lt;/ins&gt;If you need to write your passphrase down to remember it, keep it somewhere safe (e.g. your wallet) and protect it in the same way that you would protect the key to your office or home.  Do not store it anywhere near your computer.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;One method for generating long but reasonably memorable passphrases is [http://world.std.com/~reinhold/diceware.html Diceware].&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;One method for generating long but reasonably memorable passphrases is [http://world.std.com/~reinhold/diceware.html Diceware].&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:Security]]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:Security]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Steve410.cs.jhu.edu</name></author>
	</entry>
	<entry>
		<id>https://support.cs.jhu.edu/wiki/index.php?title=Category:Disk_Encryption&amp;diff=1916&amp;oldid=prev</id>
		<title>Steve410.cs.jhu.edu at 20:57, 13 January 2016</title>
		<link rel="alternate" type="text/html" href="https://support.cs.jhu.edu/wiki/index.php?title=Category:Disk_Encryption&amp;diff=1916&amp;oldid=prev"/>
		<updated>2016-01-13T20:57:07Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 20:57, 13 January 2016&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;JHU requires that anyone who stores &amp;quot;sensitive information&amp;quot; on their laptop must ensure that information is encrypted.  This includes, among other things, financial data, student records, employment records, social security numbers, other ''personally identifiable information'' '''(PII)''', and certain research data involving human subjects.  Sensitive information might come from a variety of sources, including email sent to you. Consequently, we recommend that every computer used for Department work (administrative, class-related, research, or other) make use of full-disk encryption, especially if that computer ever resides in an unsecured environment (e.g. a laptop you ever take out of your office, or a desktop located in a room to which multiple people have access).&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;JHU requires that anyone who stores &amp;quot;sensitive information&amp;quot; on their laptop must ensure that information is encrypted.  This includes, among other things, financial data, student records, employment records, social security numbers, other &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;[https://en.wikipedia.org/wiki/Personally_identifiable_information &lt;/ins&gt;''personally identifiable information'' '''(PII)'''&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;]&lt;/ins&gt;, and certain research data involving human subjects.  Sensitive information might come from a variety of sources, including email sent to you. Consequently, we recommend that every computer used for Department work (administrative, class-related, research, or other) make use of full-disk encryption, especially if that computer ever resides in an unsecured environment (e.g. a laptop you ever take out of your office, or a desktop located in a room to which multiple people have access).&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;We provide guidance for implementing full-disk encryption on various systems on the following pages:&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;We provide guidance for implementing full-disk encryption on various systems on the following pages:&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Steve410.cs.jhu.edu</name></author>
	</entry>
	<entry>
		<id>https://support.cs.jhu.edu/wiki/index.php?title=Category:Disk_Encryption&amp;diff=1915&amp;oldid=prev</id>
		<title>Steve410.cs.jhu.edu at 20:55, 13 January 2016</title>
		<link rel="alternate" type="text/html" href="https://support.cs.jhu.edu/wiki/index.php?title=Category:Disk_Encryption&amp;diff=1915&amp;oldid=prev"/>
		<updated>2016-01-13T20:55:40Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 20:55, 13 January 2016&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;JHU requires that anyone who stores &amp;quot;sensitive information&amp;quot; on their laptop must ensure that information is encrypted.  This includes, among other things, financial data, student records, employment records, social security numbers, other personally identifiable information (PII), and certain research data involving human subjects.  Sensitive information might come from a variety of sources, including email sent to you. Consequently, we recommend that every computer used for Department work (administrative, class-related, research, or other) make use of full-disk encryption, especially if that computer ever resides in an unsecured environment (e.g. a laptop you ever take out of your office, or a desktop located in a room to which multiple people have access).&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;JHU requires that anyone who stores &amp;quot;sensitive information&amp;quot; on their laptop must ensure that information is encrypted.  This includes, among other things, financial data, student records, employment records, social security numbers, other &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;''&lt;/ins&gt;personally identifiable information&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;'' '''&lt;/ins&gt;(PII)&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;'''&lt;/ins&gt;, and certain research data involving human subjects.  Sensitive information might come from a variety of sources, including email sent to you. Consequently, we recommend that every computer used for Department work (administrative, class-related, research, or other) make use of full-disk encryption, especially if that computer ever resides in an unsecured environment (e.g. a laptop you ever take out of your office, or a desktop located in a room to which multiple people have access).&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;We provide guidance for implementing full-disk encryption on various systems on the following pages:&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;We provide guidance for implementing full-disk encryption on various systems on the following pages:&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Steve410.cs.jhu.edu</name></author>
	</entry>
	<entry>
		<id>https://support.cs.jhu.edu/wiki/index.php?title=Category:Disk_Encryption&amp;diff=1913&amp;oldid=prev</id>
		<title>Phil.cs.jhu.edu: Created page with &quot;JHU requires that anyone who stores &quot;sensitive information&quot; on their laptop must ensure that information is encrypted.  This includes, among other things, financial data, stud...&quot;</title>
		<link rel="alternate" type="text/html" href="https://support.cs.jhu.edu/wiki/index.php?title=Category:Disk_Encryption&amp;diff=1913&amp;oldid=prev"/>
		<updated>2016-01-13T20:48:30Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;JHU requires that anyone who stores &amp;quot;sensitive information&amp;quot; on their laptop must ensure that information is encrypted.  This includes, among other things, financial data, stud...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;JHU requires that anyone who stores &amp;quot;sensitive information&amp;quot; on their laptop must ensure that information is encrypted.  This includes, among other things, financial data, student records, employment records, social security numbers, other personally identifiable information (PII), and certain research data involving human subjects.  Sensitive information might come from a variety of sources, including email sent to you. Consequently, we recommend that every computer used for Department work (administrative, class-related, research, or other) make use of full-disk encryption, especially if that computer ever resides in an unsecured environment (e.g. a laptop you ever take out of your office, or a desktop located in a room to which multiple people have access).&lt;br /&gt;
&lt;br /&gt;
We provide guidance for implementing full-disk encryption on various systems on the following pages:&lt;br /&gt;
&lt;br /&gt;
* [[Linux Disk Encryption]]&lt;br /&gt;
* Windows Disk Encryption ''coming soon''&lt;br /&gt;
* OSX Disk Encryption ''coming soon''&lt;br /&gt;
&lt;br /&gt;
== Disk Encryption Passphrases ==&lt;br /&gt;
&lt;br /&gt;
The passphrase for your disk should be something long enough that it cannot be guessed, even by a determined computer, but ideally something that you can remember.  It should not be the same as your everyday password for your computer.  (It's okay to use the same passphrase for your disk encryption and your root/administrator account, assuming that you primarily use &amp;lt;tt&amp;gt;sudo&amp;lt;/tt&amp;gt; or similar privilege escalation tools rather than &amp;lt;tt&amp;gt;su&amp;lt;/tt&amp;gt; (or logging in as root/administrator) to work with administrative permissions.)  If you need to write your passphrase down to remember it, keep it somewhere safe (e.g. your wallet) and protect it in the same way that you would protect the key to your office or home.  Do not store it anywhere near your computer.&lt;br /&gt;
&lt;br /&gt;
One method for generating long but reasonably memorable passphrases is [http://world.std.com/~reinhold/diceware.html Diceware].&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]]&lt;/div&gt;</summary>
		<author><name>Phil.cs.jhu.edu</name></author>
	</entry>
</feed>