This content is viewable by Everyone

Proof of Encryption

Subscribe to Service

How to Request Access

For Informational use.

The UCSF Minimum Security Standard requires that information residing on devices be encrypted. UCSF IT Security provides and supports encryption software for Windows and MacOS computers to the UCSF community at no charge. More information about Dell Data Protection Encryption (DDPE) is available at

Please note that all current Macs that meet minimum security standards should use Jamf Pro to manage their FileVault encryption. You can enroll your Mac into Jamf Pro under "Mac Encryption - MacOS" from  Macs whose encryption are already managed by DDPE may continue to use that until further notice.  Please note that DDPE for Macs is discontinued by Dell since February 2021 and is no longer a maintained software product on Macs.

Windows computers that are encrypted with BitLocker, or are capable of being encrypted with BitLocker, can use Dell Encryption Enterprise BitLocker Manager (DEE BitLocker Manager) instead of using the Proof of Encryption Form. You can install Dell Encryption Enterprise BitLocker Manager from

If you need to use an encryption method other than the UCSF-provided solution due to technical or business requirements, you should submit an Encryption Variance Request for Individuals . One of the requirements is the installation of IBM BigFix to record the computer's serial number in UCSF's CMDB asset database. Download the BigFix installer from

Information Technology Services (ITS) provides 24/7 support for key escrow and recovery for Dell Encryption (DDPE / DEE BitLocker Manager) and Symantec Encryption Desktop (PGP) encryption products via the IT Service Desk ( or 415-514-4100). ITS does not provide this service for alternate encryption methods; those are the department's or individual’s responsibility.

If you have submitted a Proof of Encryption form and need to retrieve your Encryption Recovery Keys, check your DocuSign account via UCSF MyAccess. UCSF cannot guarantee the validity of Recovery Keys stored in Proof of Encryption forms, as the information is provided entirely by the submitter.  

Additional information

FileVault 2 instructions:

BitLocker instructions: