Data Encryption Policy
Data Encryption Policy
1. Overview
ReCom Consulting Ltd. “Confidential Information” and Employee, Educator or Student Personally
Identifiable Information (“PII”) must be protected while stored at-rest and in-transit. Appropriate
encryption technologies must be used to protect the ReCom Consulting Ltd. .
2. Purpose
The purpose of this policy is to provide guidance on the use of encryption technologies to protect ReCom
Consulting Ltd. data, information resources, and other Confidential Information or PII while stored at rest
or transmitted between parties. This policy also provides direction to ensure that regulations are followed.
3. Scope
This policy applies to all ReCom Consulting Ltd. staff that create, deploy, transmit, or support application
and system software containing Confidential Information or PII. It addresses encryption policy and
controls for Confidential Information or PII that is at rest (including portable devices and removable
media), data in motion (transmission security), and encryption key standards and management.
4. Policy
A. ACCESS
The use of proprietary encryption algorithms are not allowed unless reviewed by qualified
experts outside of the vendor in question and approved by ReCom Consulting Ltd.
management.
C. AT-REST ENCRYPTION
• Hard drives that are not fully encrypted (e.g., disks that one or more un-encrypted
partitions, virtual disks) but connect to encrypted USB devices, may be vulnerable to
security breach from the encrypted region to the unencrypted region. Full disk
encryption avoids this problem and shall be the method of choice for user devices
containing Confidential Information or PII.
o Use of Virtual Private Networks (VPN’s) and Firewalls with strict access
controls that authenticate the identity of those individuals accessing the
Confidential Information or PII
o File systems, disks, and tape drives in servers and Storage Area Network
(SAN) environments are encrypted using industry standard encryption
technology
o Computer hard drives and other storage media that have been encrypted
shall be sanitized to prevent unauthorized exposure upon return for
redistribution or disposal
• Portable devices (e.g. smart-phones, flash cards, SD cards, USB file storage)
represent a specific category of devices that contain data-at-rest. Many incidents
involving unauthorized exposure of Confidential Information or PII are the result of
stolen or lost portable computing devices. The most reliable way to prevent
exposure is to avoid storing Confidential Information or PII on these devices.
devices, encryption reduces the risk of unauthorized disclosure in the event that the
device becomes lost or stolen. The following procedures shall be implemented when
using portable storage:
o Devices shall not be used for the long-term storage of any Confidential
Information or PII.
o Removable media including CD’s, DVD’s, USB flash drives, etc. shall not be
used to store Confidential Information or PII.
E. IN-TRANSIT ENCRYPTION
In-transit encryption refers to transmission of data between end-points. The intent of these
policies is to ensure that Confidential Information or PII transmitted between companies,
across physical networks, or wirelessly is secured and encrypted in a fashion that protects
student Confidential Information or PII from a breach.
• Users follow ReCom Consulting Ltd. acceptable use policies when transmitting data
and take particular care when transmitting or re-transmitting Confidential Information
or PII received from non-ReCom Consulting Ltd. staff.
• Strong cryptography and security protocols (e.g. TLS, IPSEC, SSH, etc.) are used to
safeguard Confidential Information or PII during transmission over open public
networks. Such controls include:
o Only accepting trusted keys and certificates, protocols in use only support
secure versions or configurations, and encryption strength is appropriate for
the encryption methodology in use.
o Public networks include but are not limited to the Internet, Wireless
technologies, including 802.11, Bluetooth, and cellular technologies.
Effective enterprise public and private key management is a crucial element in ensuring
encryption system security. Key management procedures must ensure that authorized
users can access and decrypt all encrypted Confidential Information or PII using controls
that meet operational needs. ReCom Consulting Ltd. key management systems are
characterized by following security precautions and attributes:
• ReCom Consulting Ltd. uses procedural controls to enforce the concepts of least
privilege and separation of duties for staff. These controls apply to persons involved
in encryption key management or who have access to security-relevant encryption
key facilities and processes, including Certificate Authority (CA) and Registration
Authority (RA), and/or contractor staff.
• IT Security Manager shall verify backup storage for key passwords, files, and
Confidential Information or PII to avoid single point of failure and ensure access to
encrypted Confidential Information or PII.
• Key management should be fully automated. ReCom Consulting Ltd Project Manager
should not have the opportunity to expose a key or influence the key creation.
• Application and system resource owners should be responsible for establishing data
encryption policies that grant exceptions based on demonstration of a business need
and an assessment of the risk of unauthorized access to or loss of Confidential
Information or PII.
• Key management processes and procedures for cryptographic keys are fully
documented.
Note: If retired or replaced cryptographic keys need to be retained, these keys must be
securely archived. Archived cryptographic keys should only be used for
decryption/verification purposes.
Cryptographic key custodians shall formally acknowledge that they understand and
accept their key-custodian responsibilities.
• ReCom Consulting Ltd. shall inventory encrypted devices and validate implementation of
encryption products at least annually.
• Exception logs exist and can be produced for those resources that are excluded from this
policy.
6. Enforcement
Staff members found in policy violation may be subject to disciplinary action, up to and including
termination.
7. Distribution
This policy is to be distributed to all ReCom Consulting Ltd. staff and contractors using ReCom
Consulting Ltd. Confidential Information or PII resources.