Executive Summary

1.1. This document outlines the policy on cryptographic controls in place for Aspen Connect.

1.2. The purpose of this document is to provide guidance that limits the use of encryption to those algorithms that have received substantial public review and have been proven to work effectively.

1.3. As part of a modern and efficient organization Aspen Connect uses mobile devices such as notebook computers, USB hard drive, memory stick and Personal Digital Organizers to better serve our clients, however all these devices must be used in a secure manner.

1.4. The exchange of sensitive data by email and over the internet require that procedures in place for the secure exchange of data using cryptographic controls.

The full policy is available here.

Course Progress