Laserfiche WebLink
Security Policies and Procedures <br />D. Device Encryption Policy <br />Virtru requires devices have encryption enabled for any files, folders, drives, <br />databases, or other stored data that may have sensitive information including <br />protected personally identifiable information. <br />The implementation of any encryption scheme is performed by the user and the <br />deployment of the encryption tool, including all keys, must meet industry best practices <br />and be properly documented. Currently the minimum standard is 128-Bit encryption. <br />Encryption keys will be managed by the user and a log will be maintained by the ISO. <br />Mac OS Devices: <br />Mac OS devices that store Protected Information (PHI, CJIS, etc), are required to use <br />full disk encryption using FileVault 2. Users must provide a copy of their key to the <br />ISO; both will maintain the key in a secure location. <br />For devices that do not store Protected Information (PHI, CJIS, etc), full disk <br />encryption is at the discretion of the user. However, if this is used, a copy of the <br />encryption key will be stored by both the user and the ISO in a secure location. <br />Windows OS Devices: <br />Windows OS devices that store Protected Information (PHI, CJIS, etc) are required <br />to use full disk encryption with the program Bitlocker. The encryption key will be <br />maintained in a secure location by both the user and the ISO. <br />For devices that do not store Protected Information (PHI, CJIS, etc), full disk <br />encryption is at the discretion of the user. However, if this is used, a copy of the <br />encryption key will be stored by both the user and the ISO in a secure location. <br />Linux OS Devices <br />Linux OS devices that store Protected Information (PHI, CJIS, etc) are required to <br />use full disk encryption. This will be encrypted at a minimum of 128 bit encryption. <br />The encryption key will be maintained in a secure location by both the user and the <br />ISO. <br />For devices that do not store Protected Information (PHI, CJIS, etc), full disk <br />encryption is at the discretion of the user. However, if this is used, a copy of the <br />encryption key will be stored by both the user and the ISO in a secure location. <br />Rev.2015.8.6 <br />41 <br />