Encryption Variance Request for individuals

Sarah Mays's picture

Click here to fill out a Proof of encryption form.


IT Security requires the following information to approve an encryption variance request.


  • Device User/Owner name and signature
  • Name of item Manufacturer, Model 
and Serial Number
  • Encryption Method
  • Recovery Key

IT provides 24/7 support for key escrow/passphrase recovery for supported encryption products. IT does not provide this for alternate encryption methods; this is the department or individual’s responsibility.