PGP Encryption

Tags Software

Description

Encryption software for use with sensitive data. Typical use cases include:

  • FERPA, HIPAA, PCI, intellectual property, or other data confidentiality obligations.

  • Devices that need to be encrypted and which need additional safeguards for the encryption keys, including the ability to recover a lost/forgotten key.

For personal device encryption, consider using the free Bitlocker Encryption .

Access

  • Access provided by request to the IT Service Desk

Cost

  • $135 per user for initial setup.

  • $29.48 annual subscription.

Who can access

  • University-owned computers only.

How to request access

Contact the IT Service Desk with the following information:

  • OHIO ID of each user who needs a subscription.

  • Departmental account number for billing.

Features

  • Device encryption for use with sensitive data

  • Ability to recover lost/forgotten encryption key

Platform

  • Windows only.

Additional resources

Service support

Get help

  • Visit the Technology Help Center ( help.ohio.edu ) to get live support, view outages, and browse trainings.

Accessibility

Ohio University strives to make its digital resources and services accessible to all visitors, including those with disabilities who may also be using assistive technology. If special steps are necessary in order to improve the accessibility of experiences for end-users, those steps must be taken. 

If you experience a barrier that affects your ability to access OHIO websites, videos, online forums, documents, or other information technology, please let us know
For further information about OHIO's digital accessibility resources, see:

Security

The Ohio University Information Security Office strives to educate and empower the University community to appropriately manage risks and protect OHIO’s information and systems. This effort is facilitated through policies, standards, and information security risk management program, as well as other tools and guidance that are provided to the University community. This modern approach creates a safe computing environment in which the University community can teach, learn, and conduct research. 

For additional information about OHIO’s security resources, see: