1.0 Purpose
The purpose of this policy is to provide guidance that limits the use of encryption to those algorithms that have been proven to work effectively.
           
2.0 Scope
This policy applies to all Marquette University employees and affiliates.
             
3.0 Policy
University faculty and staff are encouraged to encrypt files, documents, and messages containing sensitive or confidential University information for protection against unauthorized disclosure while in transit. 

However, any encryption performed on University systems must use proven standard algorithms and such encryption must permit properly designated University officials, when required and authorized to decrypt the information.

Proven, standard algorithms should be used as the basis for encryption technologies. Examples of standard encryption tools include:

The use of proprietary encryption algorithms is not allowed for any purpose, unless reviewed by qualified experts outside of the vendor in question and approved by Information Technology Services.  Be aware that the export of encryption technologies is restricted by the U.S. Government. Residents of countries other than the United States should make themselves aware of the encryption technology laws of the country in which they reside.
             
4.0 Enforcement
Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.
            
5.0 Definitions
Proprietary Encryption:  An algorithm that has not been made public and/or has not withstood public scrutiny. The developer of the algorithm could be a vendor, an individual, or the government.
                 
Symmetric Cryptosystem:  A method of encryption in which the same key is used for both encryption and decryption of the data.

Asymmetric Cryptosystem:  A method of encryption in which two different keys are used: one for encrypting and one for decrypting the data (e.g., public-key encryption).

ABOUT IT SERVICES LINKS

Areas within IT Services

Organizational chart

Staff list (restricted to campus)

Employee recognition

IT Projects Status

Our location: Cudahy Hall

Check for career openings

Students: Apply for student jobs

Policies


SITE MENU