Skip to navigation content (Press Enter).


Data Protection Via Encryption

In our daily affairs at work we sometimes need to deal with information that needs to be protected such as personal , medical, academic or governmental data. The protection of this information is actually legislated by laws (see: Best practices dictate that we must protect sensitive data:

  • At the point of capture.
  • When it is transferred over a network (such as the internet).
  • When it is at rest (such as when it is sitting on the computer's hard drive or on a USB memory key or USB storage unit).

Download: Information Handling Matrix

Achieving Data Protection

Information that is handled by computers, normally in plain-text mode, can be "encrypted" or transformed  by scrambling it in such a way that it becomes unreadable by entities that do not possess the key to unscramble it and make it readable again. Encryption ensures confidentiality but other techniques are still needed to ensure integrity and authenticity of the information, especially when it is being transferred from one point to another.

Why do we need to protect the data?

Because it has become far too easy to intercept information and capture it as it travels over the internet or be stolen from unprotected repositories.  If the information is encrypted in all these points, the stolen data becomes unreadable for the interceptor and this removes the risk of having it compromised.  Data interception can be achieved using specialized software such as Data Sniffers to “grab” the traffic flowing into or out of a computer attached to a network.

How can I ensure that my data is protected by some form of encryption?

First, by ensuring that when the data is being captured - such as when I am entering a password on some internet web form (banking websites, social networks, internet mail, etc) – it is done so by a website that uses Secure Socket Layers (SSL) (Info on SSL) on the internet address. To be precise, the internet address I am sitting on must use "HTTPS" at the beginning of the internet address as supposed to the traditional "HTTP" format that most websites use. A second way of identifying a secure website is by looking for the padlock symbol either at the beginning of the internet address or at the end of it. If the padlock symbol is present and the address begins with HTTPS you are most likely using a secure website.

More on website encryption here:

Encryption of information when it is at rest

It is important to protect information that is at rest, specifically when it is stored either on a local hard drive and more importantly on a removable USB key or USB storage unit. The risk of exposing/leaking data by having these falling into the wrong hands is a high price to pay. Protection in these cases can be achieved by using personal encryption tools such as Truecrypt (http://

Computer users should take measures to reduce risk of leaking of data at rest by:

  • Restricting physical access to servers, USB or network storage units and USB keys containing sensitive data.
  • Installing security updates.
  • Configuring computer systems properly to avoid unwanted electronic exposure.
  • Installing appropriate anti-virus software.
  • Coding web applications following OWASP guidelines.
  • Following safe password usage guidelines <link to password policy page).

Protection in these cases can be achieved by using personal encryption tools such as AES Crypt (

Service Bulletins

Citrix Receiver Client Update

UTS asks Citrix users to upgrade Citrix Receiver Client to the most current version by February 28, 2017. See UTS Citrix website for installation and removal information.

Mosaic Upgraded Interface

Service Desk

Client Self Service:
Hours: Monday - Friday
8:30 am - 4:30 pm
Phone: 905-525-9140 x24357 (2HELP)
Location: Main Campus BSB Rm. 245
Service Catalogue:

Great Idea Site

Great Idea