Approval to Decrypt Device for Travel

advertisement
THE UNIVERSITY OF TEXAS AT EL PASO
APPROVAL TO DECRYPT DEVICE FOR TRAVEL ABROAD
This form is to be used for providing information when travel abroad with a University owned/leased device.
1. Travel Information:
Individual Traveling:
Click here to enter text.
Title:
Click here to enter text.
Department:
Click here to enter text.
Email:
Click here to enter text.
Phone:
Click here to enter text.
Travel Dates (Start):
Click here to enter text.
Travel Dates (End):
Click here to enter text.
List All Destination(s) Click here to enter text.
OR Provide Itinerary:
2. Device Information (List individually):
UTEP Tag#, MAC Device
Owning
Device Location
Is Device Being
Address, or SN
Host Name
Department
Building/Room #
Backed-up?
Click here to
Click here to
Click here to enter
Click here to enter
☐ Yes
enter text.
enter text.
text.
text.
☐ No
Click here to
Click here to
Click here to enter
Click here to enter
☐ Yes
enter text.
enter text.
text.
text.
☐ No
Instructions for retrieving the Host Name and other information may be found here:
•
Windows Host Name Look-Up •
Apple and Linux Host Name Look-Up
3. Authorization to Remove Equipment Off Campus:
Authorization Form Approved by Dean, Director, Chair?
Authorization Form Filed with Department?
☐
Yes
☐
No
☐
Yes
☐
No
4. Classification of Data on Device:
Does device contain Confidential, Research, or Other
If “Yes”; state level of classification?
Sensitive Information?
☐ Category I
☐ Category II
☐
Yes
☐
No
☐ Category III
☐ Other (Specify)
Click here to enter text.
For more information on Data Classification, please visit the following website:
 The University of Texas at El Paso Data Classification Standard
 UTEP Information Security Policies
5. Submitted By (Signature):
Date:
6. Approval to Remove Encryption from Device (Decrypt):
Gerard D. Cochrane,
Date:
Chief Information Security Officer:
Click here to enter a date.
Re-Encrypted By:
Click here to enter text.


ISO USE ONLY – REENCRYPTION COMPLETION
Encryption Validated By:
Click here to enter text.
☐
☐
Approved
Denied
Date:
Click here to enter text.
UT System Information Resources Use and Security Policy (UTS165)
Information Security Practice Bulletin #1: Encryption Practices for Storage of Confidential University
Data on Portable and Non-University Owned Computing Devices
Rev 05/2013
Download