UW-Madison Policy for Storage, Transmission and Encryption of Sensitive Information (IEncrypt)
The current version of the policy is published at: http://www.cio.wisc.edu/policies/IEncryptPolicy.pdf.
Attached below is the current version (2010-09-24a).
For draft revisions (if any) see IEncrypt Policy Drafts.
For older versions please see IEncrypt Policy Archive and IEncrypt Policy Drafts Archive.
Definition of Sensitive Information.
09/16/09 article on encryption policy. (Cached here)
07/25/09 Web page mentions storage and encryption. (Cached here)
05/17/09 Web page includes references to encryption. (Cached here)
03/23/09 Article on encryption. (Cached here)
History of development and revisions
|IEncrypt History||History of development and revision of the policy.|
Older released versions.
|IEncrypt Policy Drafts||Drafts currently under development See also: IEncrypt Policy Drafts Archive.|
Recommendations of the IEncrypt Policy Stakeholders Team.
|Encryption Futures Task Force||Made immediate and long-term recommendations for encryption tools.|
|Protection of Sensitive Information During Transmission (ITransmit)||IT policy initiative for adding transmission encryption to the IEncrypt policy. ITransmit Recommendations.|
Help guide implementation and revision.
Directly related to IEncrypt. Loss of a laptop or other portable device or media would not need to be reported as an information incident if the sensitive information on that device or media is encrypted.