How to Design or Review an Encryption Policy

BCLP
Contact

Encryption refers to the process of converting data into a form that is unreadable unless the recipient has a pre-designated algorithm, “key,” and password to convert the information into readable text. Most statutes, regulations, and agencies that require that companies utilize encryption to protect data do not mandate that a specific encryption standard be used. Some statutes do require, however, that companies use an encryption key that is at least 128-bits in length.

When examining whether a company’s use of encryption is reasonable and appropriate for the type of data collected and the risks posed to that data, regulators often examine whether a company utilizes encryption “at rest” and/or “in transit.” Encryption “at rest” refers to encryption applied to data while it is being stored. Encryption “in transit” refers to encryption applied to data while it is being transmitted across a network. Depending upon the type of software being used, and the architecture of a database, encryption at rest may significantly impair the ability of the data to be accessed and used efficiently. 

What to think about when designing, or reviewing, an encryption policy:

1. What types of data does our organization encrypt?

2. Is the data encrypted at rest?

3. Is the data encrypted in transit?

4. What encryption standards are used at rest and/or in transit?

5. Are those encryption standards considered “strong” within the security community?

6. Is there evidence that those encryptions standards have been compromised?

7. Is there a process to review the sufficiency of the encryption standard periodically (e.g., once per year)?

8. Has your organization contractually agreed to maintain a specific encryption standard?

The following provides snapshot information concerning encryption. 

6

Number of states that require that sensitive information be encrypted when sent across public networks.1

1

Number of states which explicitly require that sensitive information be encrypted when sent wirelessly.2

1

Number of states which explicitly require that sensitive information be encrypted when stored on laptops or on portable devices.3

51

Data breach notification statutes that contain an exemption for encrypted data.

 

[1] Bryan Cave Survey of State Safeguard Statutes (2015).

[2] Id.

[3] Id.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations. Attorney Advertising.

© BCLP

Written by:

BCLP
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

BCLP on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide