Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Based upon both market trends and device usage on campus, the ISO has opted to specify approved methods for encrypting Apple, Blackberry, and Android based handheld devices.

...

Apple iOS devices

Supported devices include the iPhone 3GS, iPhone 4, iPad, and iPod Touch (3rd generation or later) only, running iOS 4.x.  Earlier versions of the hardware and operating system software do not support key security features, such as hardware encryption.

...

RIM BlackBerry OS devices

Devices using version 4.2 and later of the BlackBerry OS are supported.  Earlier versions of the operating system do not support all encryption options, such as encryption of media cards. 

The only approved encryption method for BlackBerry devices is the native content protection.

To enable content protection:
1. Click Options.
2. Click Security Options.
3. Click General Settings.
4. Set Content Protection to Enabled.

To encrypt media cards:
1. Click Options.
2. Depending upon the version of the OS, click Media Card or click Advanced Options and then click Media Card.
3. Set Encryption Mode to either Device, Security Password, or Security Password & Device.

...

Google Android devices

Android does not have any native tools to encrypt either user data or the device.  Some third party applications and services, such as TouchDownGood for Enterprise, and Trust Digital, can provide limited encryption functionality for Exchange data.  Other applications can offer encrypted storage containers.  This fragmented, piecemeal approach to data protection could be cumbersome for users and would be difficult to verify for audit and compliance purposes.  At this time, due to the fact that there is no native device encryption available and that the ISO is unfamiliar with third party offerings, there are no approved encryption methods for Android devices.  Departments wishing to support Android users should contact the ISO at security@utexas.edu to discuss their plans to protect university data that will be stored on or accessible with the devices.This content has moved.

Please see: https://security.utexas.edu/iso-policies/approved-encryption-methods