THE UNIVERSITY OF TEXAS AT EL PASO APPROVAL TO DECRYPT DEVICE FOR TRAVEL ABROAD This form is to be used for providing information when travel abroad with a University owned/leased device. 1. Travel Information: Individual Traveling: Click here to enter text. Title: Click here to enter text. Department: Click here to enter text. Email: Click here to enter text. Phone: Click here to enter text. Travel Dates (Start): Click here to enter text. Travel Dates (End): Click here to enter text. List All Destination(s) Click here to enter text. OR Provide Itinerary: 2. Device Information (List individually): UTEP Tag#, MAC Device Owning Device Location Is Device Being Address, or SN Host Name Department Building/Room # Backed-up? Click here to Click here to Click here to enter Click here to enter ☐ Yes enter text. enter text. text. text. ☐ No Click here to Click here to Click here to enter Click here to enter ☐ Yes enter text. enter text. text. text. ☐ No Instructions for retrieving the Host Name and other information may be found here: • Windows Host Name Look-Up • Apple and Linux Host Name Look-Up 3. Authorization to Remove Equipment Off Campus: Authorization Form Approved by Dean, Director, Chair? Authorization Form Filed with Department? ☐ Yes ☐ No ☐ Yes ☐ No 4. Classification of Data on Device: Does device contain Confidential, Research, or Other If “Yes”; state level of classification? Sensitive Information? ☐ Category I ☐ Category II ☐ Yes ☐ No ☐ Category III ☐ Other (Specify) Click here to enter text. For more information on Data Classification, please visit the following website: The University of Texas at El Paso Data Classification Standard UTEP Information Security Policies 5. Submitted By (Signature): Date: 6. Approval to Remove Encryption from Device (Decrypt): Gerard D. Cochrane, Date: Chief Information Security Officer: Click here to enter a date. Re-Encrypted By: Click here to enter text. ISO USE ONLY – REENCRYPTION COMPLETION Encryption Validated By: Click here to enter text. ☐ ☐ Approved Denied Date: Click here to enter text. UT System Information Resources Use and Security Policy (UTS165) Information Security Practice Bulletin #1: Encryption Practices for Storage of Confidential University Data on Portable and Non-University Owned Computing Devices Rev 05/2013