Encryption Variance Request for individuals
Click here to fill out a Proof of encryption form.
IT Security requires the following information to approve an encryption variance request.
- Device User/Owner name and signature
- Name of item Manufacturer, Model and Serial Number
- Encryption Method
- Recovery Key
IT provides 24/7 support for key escrow/passphrase recovery for supported encryption products. IT does not provide this for alternate encryption methods; this is the department or individual’s responsibility.