File and Device Encryption SC
- Kevin Bom
- tito1365
- Daniel LaGrow
Service | File and Device Encryption | ||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Service Manager | Kevin Bom, Manager of Enterprise Infrastructure Services | ||||||||||||||||||||||||||||||||||||||||
Department | Enterprise Infrastructure Services | ||||||||||||||||||||||||||||||||||||||||
Contact | Location: Thompson Hall, E226 Phone Number: (716) 673-3748 Email: Kevin Bom All requests for assistance are completed using the Tracker Customer Portal | ||||||||||||||||||||||||||||||||||||||||
Service Owner | Chief Information Officer | ||||||||||||||||||||||||||||||||||||||||
Description | Files and devices store information in an encrypted format. Function 1: Provide key storage/recovery management services. Function 2: Provide centrally managed shared folder space using Universal Server and PGP Netshare. | ||||||||||||||||||||||||||||||||||||||||
Service Users | Faculty, staff, associates, students, guests and laptops using Windows Bitlocker are users of this service. | ||||||||||||||||||||||||||||||||||||||||
User Services | Encryption is the strongest protection that Windows provides to help keep information secure. | ||||||||||||||||||||||||||||||||||||||||
Business Services | Faculty’s, Staff’s and Associates’ departments/units and IT Service Center may request this service. | ||||||||||||||||||||||||||||||||||||||||
Technical Services | Give a summary of the back-end services that support this service | ||||||||||||||||||||||||||||||||||||||||
Requirements | There are no or minimal user, business or technical services requirement for using this service. | ||||||||||||||||||||||||||||||||||||||||
Rates / Cost of Use | There are no fees associated with using these services. | ||||||||||||||||||||||||||||||||||||||||
Getting Started | The requestor of Function 1 of this service is the IT Service Center. Function 2 may be requested by any campus faculty, staff or associate. | ||||||||||||||||||||||||||||||||||||||||
Availability | File and device encryption is performed during normal or standard business hours of operation. | ||||||||||||||||||||||||||||||||||||||||
SLA Notes | |||||||||||||||||||||||||||||||||||||||||
Business Procedures | The business procedure is located with the Primary responsible person on the RACI form and also, see Appendix A. | ||||||||||||||||||||||||||||||||||||||||
Change Procedures | Changes to the service (transition, additions, and discontinuations) must be reviewed by TAC and approved by the Service Manager (CIO) and Cabinet. | ||||||||||||||||||||||||||||||||||||||||
Assigned Primary Support | Scott Grien | ||||||||||||||||||||||||||||||||||||||||
Assigned Secondary Support | |||||||||||||||||||||||||||||||||||||||||
RACI Chart | Function 1 Name: Provide key storage/recovery management services Description: Used to protect data in transit sent from a multitude of devices across all network types.
Function 2 Name: Provide centrally managed shared folder space Description: Using Universal Server and PGP (Pretty Good Privacy) data encryption/decryption program that provides cryptographic privacy and authentication for data communication.
| ||||||||||||||||||||||||||||||||||||||||
Date Last Modified | |||||||||||||||||||||||||||||||||||||||||
Status | Status |