Topics Map > University of Chicago > IT Services > Accounts, Identity, & Security > Security

Security Tools - Keep High Risk Files Safe

This article provides information on storing and sharing high risk Microsoft Office files.

High Risk files contain data whose loss or corruption might lead to legal or significant contractual liability, impair the ability of the University to perform its business or academic functions, significantly damage the image or reputation of the University, or otherwise result in legal, financial, or business loss. This data requires tight audit and access controls and should be available only on a "need to know" basis.

High risk data should be encrypted when possible.

Storing a high risk file

When storing or sharing a high risk file, you should first encrypt the file so that you don't disclose confidential information in ways that may harm yourself or someone else.

How to encrypt a file

For instructions on how to encrypt a Microsoft Office file, visit our Laptop/Tablet Encryption. An encryption key is a common term for an encryption password. If you lose your encryption key, your data is gone. Be sure to store your password in a secure location.

Important Notes

Don't use your CNet password as encryption keys for your files. If you need to move a high risk file, encrypt it before moving it. You must protect your high risk files through encryption. You can email an encrypted document to the recipient. However, you should transmit the retrieval key over the phone, by physical mail, or in person.

Sharing a high risk file safely

Once you've encrypted a file, choose a method to share the files. File share options are found on our File Storage and Sharing webpage.

Note: Some departments have established alternative file sharing systems for their staff; check with your department for guidance.

To learn about the University's policy for computers that contain confidential information, see Regulated Computer Policy - Overview.

If these tips don't meet your needs, contact your local support person or IT Services. To see a list of computer support groups, visit Local Support Contact List.

To learn about other tips for safe computing, visit our Safe Computing site.




Keywords:store, safety, share, encryption   Doc ID:16287
Owner:Rosa M.Group:University of Chicago
Created:2010-12-11 19:00 CDTUpdated:2017-04-11 14:09 CDT
Sites:University of Chicago, University of Chicago - Sandbox
Feedback:  1   1