Encryption for Windows and Mac Computers

Last Updated: August 26, 2024 10:20 am

OASIS IRB Support

Requirements:

Any computer or external flash drive or hard drive that touches your research data needs to be encrypted. The method you use to encrypt your computer, flash drive, or hard drive will be based on the operating system you are using on your primary computer.

  • Windows 11 computers and devices should be encrypted with BitLocker.
  • Mac OS computers and devices attached to should be encrypted with FileVault.

What is Encryption?

Encryption is the process of converting data into a code to prevent unauthorized access. It uses an algorithm to transform readable data, known as plaintext, into an unreadable format called ciphertext. Only those with the correct decryption key can convert the ciphertext back into readable plaintext. It is sort of like those decoder rings you might have gotten in a cereal box once upon a time, only more complex.

Any computer or external flash drive or hard drive that touches your research data needs to be encrypted. The method you use to encrypt your computer, flash drive, or hard drive will be based on the operating system you are using on your primary computer.

 

How It Works:

  1. Algorithm and Key:

    • Encryption relies on a mathematical algorithm and a key. The key is a piece of information that determines the output of the encryption algorithm.
  2. Encrypting Data:

    • When data is encrypted, the algorithm uses the key to transform the plaintext into ciphertext. This ciphertext looks like a random string of characters and is unreadable without the key.
  3. Storing or Transmitting:

    • The encrypted data (ciphertext) can be safely stored on a device or transmitted over a network. Even if intercepted, the data remains secure because it cannot be understood without the decryption key.
  4. Decrypting Data:

    • To access the original data, the recipient uses the decryption key and the same algorithm to convert the ciphertext back into plaintext. This process is called decryption.

In essence, encryption ensures that sensitive information is protected from unauthorized access, even if the data is intercepted or accessed by malicious actors.