Skip to content. | Skip to navigation


Encryption 101

Encryption is the most effective way to achieve data security.

Well… what is encryption?

Encryption is the process of encoding data so it becomes unreadable to everyone except those who have the key to decipher it.

How does encryption work?

An algorithm is used in conjunction with the key that encodes your data. After the data is encrypted, only those with the key can decrypt and read the contents.
We used programs that are already installed in Microsoft Windows and Mac O/S to encrypt your gear.

All the technical jargon aside, why do we need to encrypt?

Please read CUNY’s Policy on Acceptable use of Computer Resources
After reading CUNY’s policies on the proper use of Computer resources on all CUNY Campuses, please direct you attention to Section IV, Policy 12 where it is stated that:

“…In general, this means storing the information on a computer or auxiliary hard drive that provides strong access controls (passwords) and encrypting files, documents, and messages for protection against inadvertent or unauthorized disclosure while in storage or in transit over data networks.”

“Robust encryption and passwords must be used to protect Non-Public University Information, and is strongly recommended for information stored electronically on all computers, especially portable devices such as notebook computers, Personal Digital Assistants (PDAs), and portable data storage (e.g., auxiliary hard drives, memory sticks) that are vulnerable to theft or loss, as well as for information transmitted over public networks.”

Sign Up for Laptop Encryption

Document Actions
IT - (Instructional Computing and Information Technology) website feedback:
Hunter College 695 Park Avenue NY, NY 10065 212.772.4000
212-772-5799 | email us
695 Park Ave
NY, NY 10065