If any SPHTM faculty, student, or staff has a security concern, relating to an account or device, please contact GRIT:
GRIT works in close relation with the Tulane University Information Security Office (ISO). The mission of the Information Security Office (ISO) is to support the mission of Tulane University by assuring confidentiality, integrity and availability of its information and information systems. This mission is accomplished through implementing assurance methods that protect and defend these assets by:
All workstations that contain or work with TUMG owned data are required to use Full Disk Encryption (FDE). Software used for full disk encryption will meet standards established by FIPS, HIPAA and HITECH and Tulane Information Security and will be available through and supported by Tulane Encryption Services.
Devices that require Full Disk Encryption are required to meet minimum standards as set forth by both the vendor and Tulane Information Security. These standards will be available to Faculty and Staff for review and will include requirements for hardware, operating systems and expectations of a healthy computing environment.
Frequently Asked Questions (FAQs)
Below are the common questions the Information Security Office receives regarding Full Disk Encryption (FDE). Please contact us if you need additional information or have other concerns.
What is SecureDoc?
SecureDoc is a comprehensive full disk encryption product that secures data at rest (DAR). It has two main components: the client software used to encrypt and decrypt data and the server software used to configure, deploy and manage laptop encryption, desktop encryption and server encryption and external devices encryption for an entire organization.
The SecureDoc client software uses a FIPS 140-2 level 1 and level 2 certified AES 256-bit cryptographic engine to encrypt data. WinMagic recommends that all drives be protected with full-disk encryption (FDE), container, and volume encryption can be used to supplement FDE on shared laptops, desktops and servers to add another layer of defense for classified data, and to encrypt data on external storage devices such as USB keys, CD/DVDs, and SD cards. The SecureDoc client software provides encryption capabilities on multiple operating systems (Windows, Mac, and Linux via SecureDoc OSA).
What operating systems are supported?
Securedoc 7.1 supports Windows: 7, 8, 8.1, 10 and OS X: Mountain Lion, Mavericks, Yosemite, El Capitan, Sierra (10.8, 10.9, 10.10, 10.11, 10.12).
While earlier versions of Windows are supported, the Information Security Office highly recommends Windows 7 as a minimum requirement for PC devices.
Will full disk encryption slow down my machine?
No. Encryption runs as a background task that uses negligible system resources. While the initial encryption process is taxing on computer resources as it is encrypting all data on your physical drives, subsequent encryption takes place as a normal operation of writing data to the physical drive.
Will full disk encrypiton protect me from viruses and other malicious software?
No. Full Disk Encryption’s only function is to protect the data on a computer if it becomes accessible by a third party who does not have the credentials to log on to the machine. The operating system itself acts as normal otherwise and should still run anti-virus software and requires the same concern from the customer when avoiding malicious websites and emails.
Will full disk encryption destroy all the data on my workstation?
No. Full Disk Encryption is a safe product meant to protect information at rest on a device if it is lost or stolen.
The Information Security Office highly recommends that all staff and faculty consult their department in regards to the required back-up and recovery strategy solution recommended for them.
Will full disk encryption work with my self encrypting drive?
Yes. SecureDoc supports SED technology as an escrow service of the drive encryption key. With key escrow we can offer support if your drive needs unlocking.
Will full disk encryption work with bootcamp or dual boot technology?
No. Full Disk Encryption requires an environment that allows it to manage the boot sequence in order to protect your data at rest.
The Information Security Office highly recommends that all customers consider virtual machine software to manage multiple operating systems. VMWare is available for free to staff and faculty through the e-academy website and Technology Services is able to provide valid licensed copies of windows for installation into a VM.
Tulane processes just under five million email messages every day accommodating approximately 70,000 personal and resource accounts. Technology Services dedicates significant resources to filter these messages for spam and phishing because we understand that phishing and spam are both annoying and potentially dangerous. We have to balance the task of blocking malicious email while not blocking legitimate traffic. Implementing much more restrictive filtering rules might result in blocking emails that Tulane customers need.
Tips To Not Get Phished
Try an interactive game to identify phishing here: Click Click Phish
Technology Services works closely with Microsoft to filter incoming messages. Read the details here.
When phishing and spam do get through, we notify Microsoft with the relevant information. Users can assist by sending any offending message along with header information to email@example.com.
See this Knowledge Base article for instructions on how to locate the header information in an email message.
Compromised user accounts - Protect your account credentials
In many cases the phishing messages that are getting through to users are the result of a compromised Tulane account – a student, faculty or staff member unwittingly gives up his Tulane password to a scammer, who then uses that legitimate Tulane account to spam or phish other Tulane users. The scammer will change the user’s password, lock him/her out of the account, and send phishing messages to thousands of Tulane recipients in seconds.
Access to other systems
Once a scammer has your credentials, they also have access to other important systems such as Canvas, Gibson, Box and every other system that accepts a Tulane username and password.
More About Phishing
See the following Knowledge Base articles related to phishing and secure computing:
Technology Services is pleased to offer Tulane faculty, staff, students, and affiliates access to security awareness on-line training. These interactive modules make it easy to keep yourself safe online, to protect your data, and stay on top of security issues.
These short and informative modules cover HIPAA, FISMA and FERPA standards as well as important topics such as Social Networking and Mobile Device Security. These videos are helpful for anyone who uses a computer.
These easy to use training tools are available through the Training Wave at Gibson online:
All courses with Course IDs beginning with "TIS" are part of the security awareness training series
Every user of Tulane University's information systems resources is responsible for protecting the confidentiality, availability and integrity of the University's information assets.The Information Security Strategy supports and coordinates our university community's efforts to secure Information and Information Systems from unauthorized access, disclosure and disruption. The document outlines Information classification; roles and responsibilities for protecting information; and provides a high level strategic overview of administrative, operational and technical controls that should be implemented to safeguard the University's information assets.
Summary of control requirements:
To assist in the appropriate handling of information, a sensitivity classification hierarchy should be used throughout Tulane University. This sensitivity classification system ensures consistent handling of information regardless of form, mode of transmission or storage.
The information classification categories are:
Roles and Responsibilities
As a member of the University community, you share in the responsibility for protecting information resources for which you have access or custodianship. In addition, there are particular responsibilities assigned to specific groups.
These specific groups are: