Yes! ALL laptops used for University business must be encrypted, regardless of who owns the laptop, or the operating system.
All workforce members (faculty, staff, volunteers, students and trainees) at OU must encrypt any laptop computer that is to be used as part of University Business. Laptops often store data in temporary files, email attachments, and downloads, and therefore device encryption is the only way to secure data against loss or theft.
WHAT IS DEVICE ENCRYPTION, AND WHAT DOES IT DO?
Encryption is a technology that protects the contents of your device from unauthorized access by converting it into unreadable code. It is a stronger level of protection than other security features, such as user logins. Device encryption encrypts the entire drive and therefore does not require users to encrypt certain folders or files.
WHY IS DEVICE ENCRYPTION IMPORTANT?
The main value of device encryption is in protecting data if the device is lost or stolen. Because laptops are portable and thus more likely to be stolen, laptop encryption is required. Several dozen OU laptops are lost or stolen each year, and it is important that any sensitive data on these laptops not be compromised. A simple log-in does not protect the underlying data and it must be encrypted to be secure.
IS DEVICE ENCRYPTION COMMON PRACTICES?
OU has had an institutional laptop encryption program since 2016 like other academic medical centers and most universities. It is considered a basic requirement for HIPAA compliance and commonly required for handling other forms of sensitive information.
WHAT TYPE OF ENCRYPTION SOFTWARE DOES OU USE?
OU uses Microsoft's BitLocker Drive Encryption for devices running Windows 10/11 Education or Pro or above and Apple's FileVault for devices running Macintosh OS X. Both of these encryption solutions are native to the respective operation system and offer significant improvement in system performance. Mobile devices, such as tablets and smartphones, are encypted using native device encryption.
HOW LONG DOES IT TAKE TO ENCRYPT MY HARD DRIVE?
It takes about 20 minutes to enable the encryption software and can then take several house to complete the encryption, during which time you can use your computer normally. Once encryption is turned on, the encryption process should not disturb you while you work.
NEED HELP?
If you need further assistance, call (405)325-HELP (4357) or visit itsupport.ou.edu for further support options.
OU IT provides guidance on how to encrypt your personal device. Please go to itsupport.ou.edu and search "encrypting your personal computer's hard drive" to find instructions on BitLocker (Windows) or FileVault (MacOS) and encryption methods.
How is University Business defined?
University Business is work performed as part of an employee’s job responsibilities, or work performed on behalf of the University by faculty, staff, volunteers, students, trainees, and other persons whose conduct, in the performance of work for the University, is under the direct control of the University, whether or not they are paid by the University. In the context of laptop use, University Business includes the use of a laptop to access OUHSC email and to access non-public University systems, networks, or data in the performance of work for the University.
Visit: OU itsupport.ou.edu
Or contact your departmental Tier One or IT representative
Risks: Storing sensitive data on your local desktop places that information at risk in the event of a data stealing malware infection. Syncing your mobile device with University systems such as email or other desktop applications has the potential to inadvertently store this information in an unprotected manner. Loss of an unencrypted portable computing device places sensitive data on the lost device at risk of unauthorized access. Such events can constitute a HIPAA data breach in which individuals will be held personally liable for HIPAA fines and penalties. See HITECH on the web at https://www.hhs.gov/hipaa/for-professionals/breach-notification/index.html
Regulations: Under federal and state law and University policy computer systems containing sensitive data with data-stealing malware infections or unencrypted mobile devices which have been lost are reportable as data breaches and must be identified to University officials. If you have any questions about your storage location or portable device please contact your Tier One or IT representative.
1. Store sensitive data such as Protected Health Information (PHI) on a server in the campus enterprise data center.
a. Your Tier One or IT representative can assist in identifying the proper server location and “shared” letter for your department.
b. Sensitive data must not be stored or maintained on desktop computers or un-encrypted portable computing devices.
c. Sensitive data definition and examples: See “Category A Data Classification” in the ”Information Classification Standard” document at https://ou.edu/dam/ouit/docs/standards/university-wide/ou-it-information-classification-standard-2020.pdf
d. If your business process requires storage of sensitive data on a portable computing device such as a laptop, flash drive, or Smartphone, then that device must be encrypted with a Federal Information Processing Standard encryption mechanism. OU IT provides guidance on how to encrypt your personal device. Please go to itsupport.ou.edu and search "encrypting your personal computers hard drive" to find instructions on BitLocker (Windows) or FileVault (MacOS) and encryption methods.
2. Install and use the most current security software available for your system to protect against malware infections and data breaches.
Contact your department Tier One or IT representative for more information before you install software on your desktop computer.
3. Follow safe Internet browsing and email practices.
a. Do not open suspicious email, especially email with unknown attachments or links to web sites.
b. Do not download non University applications or unknown software from the Internet. Example: screen savers or browser add-ons.
c. Do not browse the web or access email for non University related business. See: Acceptable Use of Information Systems policy at https://universityok.navexone.com/content/dotnet/documents/?docid=50&public=true
Does HIPAA prohibit the use of smartphones for sending, receiving, or storing patient information?
No. However, HIPAA requires you to protect the privacy and security of the information on your smartphone. Be aware that text messages from your default smartphone texting application are not secure. If you choose to use a smartphone for university business:
1. Know the risks:
a. A lost or stolen mobile device
b. Inadvertently downloading viruses or malware
c. Unintentional disclosure to unauthorized users
d. Using an unsecured Wi-Fi network
2. Tips to protect and secure health information:
a. Use a password or other user authentication
b. Install and enable encryption
c. Install and activate wiping and/or remote disabling
d. Disable and do not install file sharing applications
e. Keep security software up to date
f. Research mobile applications (apps) before downloading
g. Maintain physical control of your mobile device
h. Use adequate security to send or receive health information over public Wi-Fi networks
i. Delete all stored health information before discarding or reusing the mobile device
The University HIPAA Safeguards – Technical policy provides that individuals who store PHI on portable devices are responsible for the security of that PHI. For additional information refer to the IT Cybersecurity Policy (https://www.ou.edu/content/dam/ouit/docs/policies/university-wide/ou-cybersecurity-policy-2020.pdf) and IT knowledge base article on “Encrypting Your Personal Computer’s Hard Drive“.
OUHSC has deployed “Secure Mobile for Exchange” as one measure to protect PHI on smartphones. Enrollment is automatic for all OUHSC Exchange user email accounts. See https://itsupport.ou.edu/TDClient/34/OKC/KB/ArticleDet?ID=2331&SIDs=1401 for more information.
Type [secure] in the Subject line of a message to ensure that the message will be sent securely. Be advised the information in the subject line will not be encrypted-only the Information in the body of the email is. Your subject line should not include any PHI.
What is a Secure Email?
Secure Email allows HSC users to encrypt Sensitive Information sent to recipients outside of the campus email system. Examples of message that MUST be encrypted include:
- OU healthcare billing communications with outside agencies
- Communications between OUHSC and research agencies (FDA, NIH) that include participant information
- Communications that include PHI
For more information on Secure Email and instructions for use please see:
http://itsupport.ou.edu/TDClient/34/OKC/KB/ArticleDet?ID=2216&SIDs=1414
HIPAA Policy Summary – Sending PHI in Email
Each Health Care Component, must put in place additional safeguards, based on the clinic or area technology used, operations, types of services provided, and nature or information maintained. All emails containing PHI should only be sent for Treatment, Payment or Healthcare Operation purposes.
1. Sending Email Containing PHI within the University or to OU Health
a. Email from an OUHSC.EDU, OU.EDU, or OUHEALTH.COM email address to an OUHSC.EDU, OU.EDU, or OUHEALTH.COM email address is secure. However, content should be limited to the minimum necessary or a limited data set.
b. Within the University, PHI may be emailed only to another University HCC unless you have patient Authorization to send to another University area or the disclosure is for treatment, payment, or operations.
c. The recipient’s name and email address should be verified before the message is sent.
d. No PHI may be included in the subject line.
2. Sending Email Containing PHI Outside the University or OU Health
a. The message must be encrypted between the sender and recipient in a manner that meets HIPAA requirements (consult your IT professional if you are not sure), or the message must be sent using the University’s Secure Messaging or Secure Email program, an approved patient portal or the like. Contact IT for assistance.
b. Content should be limited to the minimum necessary or a limited data set.
c. The recipient’s name and email address should be verified before the message is sent.
d. No PHI may be included in the subject line.
3.Responding to Email from Outside the University or OU Health that Requests PHI*
*If you receive an email from a patient or other individual from a non-OU or non-OUH email address, you must:
a. Inform the individual that you need to communicate by phone or in person if the individual has not set up a secure email/secure messaging account with the University or encryption is not used by sender and recipient (see sample response in Emailing and Transmitting PHI), or
b. Respond via a secure method, observing the minimum necessary standard or by limited data set, if the email is received through one of the secure accounts or is otherwise encrypted.
*You should not send PHI by email, even if a patient or other individual requests the information be sent via email. If a patient insists on receiving PHI via unencrypted email, follow the steps outlined in the Emailing and Transmitting PHI or contact the Privacy Official for assistance. You should never send PHI in a manner that you are not comfortable is secure.
All email containing PHI sent by University HCC’s should include a Confidentiality Notice. A sample notice is included in the Emailing and Transmitting PHI, available on the University’s HIPAA webpage.
Revised: 1.30.24
I need to email patient or research participant PHI to an off-campus email, what should I do?
Before You Hit Send…
If emailing off-campus is necessary and permissible under your department or clinic rules, be sure your email is sent via a secure method and goes only to individuals authorized to receive the PHI. Secure methods include (1) using the patient portal and (2) putting [secure] in the subject line, using the brackets. Messages between ouhsc.edu email addresses are automatically encrypted, as are messages between an OUHSC.edu email address and an HCA email address, so these messages are secure as well.
Sending PHI via unsecured email – even to research sponsors or other providers – is a violation of HIPAA policy and can easily lead to a breach. The Office for Civil Rights may impose monetary penalties for HIPAA breaches, especially those that result from deliberate disregard for patient privacy. Check your email recipients and confirm that the method you are using to send PHI to a non-OUHSC or non-HCA email address is secure – if in doubt, contact OUP IS or IT Security . Finally, be sure you are NOT using auto-forwarding or redirecting your messages to accounts outside of the University email system.
Relevant HIPAA Policies and forms can be found at the University’s HIPAA website (https://apps.ouhsc.edu/hipaa/). (OU Physicians employees should also refer to MR 36 for specific OUP policy on emailing patients.)
If you have questions about these or any other HIPAA topics or would like to schedule a department training, please contact any of us; we are eager to help!
Posted: 4.18.17
What are some tips for using the Auto-Complete List in outlook?
- First confirm that the recipients in the TO line of your emails are the intended recipients BEFORE hitting Send and remember that no PHI should be sent to your personal email accounts
- Utilize this helpful hint on how to remove email recipients from auto-completing in the To, Cc, or Bcc line of your emails:
Think Twice Before Checking Your Email or Calendar From Personal Devices!
- Is your cell phone secure?
- Is your personal laptop encrypted?
If the answer is “No” to the above questions, it is against University policy to access your OUHSC email or calendar from the unsecured device. To ensure that transmissions of electronic PHI are secure, portable devices used for University business must follow the Portable Computing Device Security policy. Personal Computing Devices that fall under this policy include but are not limited to: laptops, notebook computers, tablets, smart phones, cell phones, thumb drives, and external media such as CDs or DVDs. These safeguards apply to University-owned as well as personally-owned devices. Keep in mind that if you store or download PHI on a University-owned or personally-owned desktop, that computer must be encrypted as well.
The OUHSC Information Systems – Information Security web page offers more information on how to secure your mobile device or encrypt your personal laptop at the following link: http://it.ouhsc.edu/services/infosecurity/ Contact your Tier 1 or IT Representative for assistance with encrypting a desktop.
Posted: 6.20.17