Encryption.docx - Policy and Procedure Title: ENCRYPTION...

This preview shows page 1 - 2 out of 3 pages.

The preview shows page 1 - 2 out of 3 pages.
Title: ENCRYPTIONP&P #:Approval Date:Review:AnnualEffective Date:Information TechnologyEncryptionDefinitionThe process of converting data into a secret code. Encryption is the most efficient methodof ensuring data security. You must have access to a secret key or password to decode anencrypted file in order to read it or access it. Unencrypted data is called plain text;encrypted data is referred to as cipher text.Encryption KeyAn encryption key specifies the specific transformation of plain text into cipher text, orvice versa during decryption.Sensitive data and files must be encrypted before being transmitted over networksspecially if risk analysis deems it. When encrypted data is transferred between agencies,the agencies must devise a secure key management procedure that is mutually agreedupon. In the event of a conflict, the Practice should be, in consultation with the PrivacyOfficer or other appropriate personnel. Whom shall establish the criteria. The Practice

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 3 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
Minton
Tags
Cryptography, Encryption, Privacy Officer

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture