Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Based upon both market trends and device usage on campus, the ISO has opted to specify approved methods for encrypting Apple, Blackberry, and Android based handheld devices.

...

Apple iOS devices

Supported devices include the iPhone (3GS or later), iPad, and iPod Touch (3rd generation or later) only, running iOS 4.x or above.  Earlier versions of the hardware and operating system software do not support key security features, such as hardware encryption.

...

RIM BlackBerry OS devices

Devices using version 4.2 and later of BlackBerry OS are supported.  Earlier versions of the operating system do not support all encryption options, such as encryption of media cards. 

The only approved encryption method for BlackBerry devices is the native content protection.  Content protection will encrypt data the operating system determines to be sensitive, such as emails, contacts, browser cache, and other user data.  Encrypting the contact list will disable incoming caller identification.

To enable content protection:
1. Click Options.
2. Click Security Options.
3. Click General Settings.
4. Set Content Protection to Enabled.

...

Google Android devices

Android does not have any native tools to encrypt either user data or the device.  Some third party applications and services, such as TouchDownGood for Enterprise, and Trust Digital, can provide limited encryption functionality for Exchange data.  Other applications can offer encrypted storage containers.  This fragmented, piecemeal approach to data protection could be cumbersome for users and would be difficult to verify for audit and compliance purposes.  At this time, due to the fact that there is no native device encryption available and that the ISO is unfamiliar with third party offerings, there are no approved encryption methods for Android devices.  Departments wishing to support Android users should contact the ISO at security@utexas.edu to discuss their plans to protect university data that will be stored on or accessible with the devices.
Copyright © 2001-2011 Information Technology Services. All rights reserved.This content has moved.

Please see: https://security.utexas.edu/iso-policies/approved-encryption-methods