Local Encryption ... Why Not?
-
@BRRABill said:
@scottalanmiller said:
What would make paper and disk different? Given that they are effectively identical, why is one reasonable and the other not? If you think disks should be encrypted, wouldn't that imply that all paper should just be encrypted? It's local so... why not?
Because there is no reasonable way to encrypt paper.
There is a very reasonable, easy-to-use, and inexpensive way to encrypt disks that I have demonstrated healthcare organizations use.
That's debatable. Encrypting data is only easy as long as you decrypt it and leave it unprotected when going to the end user. Encrypt that data end to end and it gets very hard.
-
@BRRABill said:
@scottalanmiller said:
@BRRABill said:
It is certainly reasonable to think you'd encrypt a laptop.
Why, you just said that paper was not reasonable to encrypt. The logic that makes paper need to be insecure would extend to the laptop, right?
Sure, it would be reasonable if it was possible.
If you are implying you cipher the text on the page, well, again that's not reasonable because how could anymore read it?
WIth a SED, the user has to do nothing more than they are used to doing, which is log in to their machine.
One is impossible, and silly.
The other is widely used, and acceptable to the only organization that matters in the HIPAA fine discussing, the OCR.
Impossible? It's literally identical to the digital way. It's VERY possible. if it was not, computers could not do it either.
-
@BRRABill said:
You can see, there are many safeguards with paper as well.
But since there is no way to encrypt paper, it doesn't apply.
http://privacyoffice.med.miami.edu/awareness/tips/protect-paper-records-with-sensitive-information
There is EVERY way to encrypt paper. We can all do it. Kids do it every day. Saying that this is all not true doesn't make it untrue.
-
I totally understand that one system is more automated than the other and it is easier to use computers than not to use computers, but we are already going to the high effort paper world here. ALL security that applies to a drive applies to paper, all, no exceptions. They are the same type of thing (bits on physical media.) You can, at any point, print disk data to paper and vice versa. They are interchangeable.
But it would be trivially easy to put in a little encryption on paper end to end. Super easy. But we don't bother, we just ignore security there.
Although it needs to be pointed out, we don't encrypt anything digitally end to end, but we take it much farther.
-
I understand in the HIPAA world because security is not a related topic and laws are, it's probably worth encrypting local drives, even if we lose data, because we don't care about losing data, we care about getting sued. But it is really important to understand that the reasons we do it for HIPAA are not security related and that HIPAA discussions don't apply to non-HIPAA discussions.
-
@scottalanmiller said:
I understand in the HIPAA world because security is not a related topic and laws are, it's probably worth encrypting local drives, even if we lose data, because we don't care about losing data, we care about getting sued. But it is really important to understand that the reasons we do it for HIPAA are not security related and that HIPAA discussions don't apply to non-HIPAA discussions.
Agreed.
Though I also use SED personally. Just in case.
I'm a "WHAT IF"-er.
-
You know, whilst at lunch today, this paper thing (and encryption in general) kind of clicked for me.
(This story might seem long winded, but it has a point)
I had my trusty little Moleskin mini notebook with me, with notes I had jotted down on Christmas gifts. I usually put this thing in my shirt pocket, but I have no shirt pocket today, so I put it in my back pants pocket. Then I thought ... what if this thing fell out of my pocket? So what? I said to myself. Ah. There it is. There is nothing of value in there. I don't write anything personal or sensitive in there. If I ever did need to, I would encode it, as we have been talking about. Like add 5 to all the PIN numbers or something. But generally I would know better than to store anything important in a notebook I carry around in my pocket and could lose.
Now, being the paranoid type, I would still worry that I had something in there. Because sometimes I admit I am a little careless about things. But for the most part I wouldn't worry about it.
Same things holds for other notebooks I have. I write some more sensitive stuff in them, but they are more for my inside the office use. Very slim chance of them getting lost. Though I always write code in those too, just to protect from prying eyes.
-
Here is someone fearful of encryption ending up, by accident, acting like a threat: http://community.spiceworks.com/topic/1357724-de-encrypting-network-shares-server-question
-
@scottalanmiller said:
Here is someone fearful of encryption ending up, by accident, acting like a threat: http://community.spiceworks.com/topic/1357724-de-encrypting-network-shares-server-question
I'm not sure how he would prevent someone from putting encrypted files onto the network?
-
Yeah, he can prevent one system from doing it, but not someone encrypting files and dropping them.
-
@scottalanmiller said:
Here is someone fearful of encryption ending up, by accident, acting like a threat: http://community.spiceworks.com/topic/1357724-de-encrypting-network-shares-server-question
I never said there weren't risks.
You always have to have systems to get around the encryption for your own uses, and also good backups.
-
@BRRABill said:
@scottalanmiller said:
Here is someone fearful of encryption ending up, by accident, acting like a threat: http://community.spiceworks.com/topic/1357724-de-encrypting-network-shares-server-question
I never said there weren't risks.
You always have to have systems to get around the encryption for your own uses, and also good backups.
But if there are risks, that answers the "why not" question. It's only in cases where there is no or effectively no downsides (good examples are virtualize every server and open sources is always better than closed source for end users) where you don't have to weigh the options. But with encryption, it's not a clear win. The weighting leans heavily towards encryption, I grant you, but there are downsides strong enough to warrant needing to consider if it is truly adding enough to make up for what it takes away. It remains situational.
-
@scottalanmiller said:
But if there are risks, that answers the "why not" question. It's only in cases where there is no or effectively no downsides (good examples are virtualize every server and open sources is always better than closed source for end users) where you don't have to weigh the options. But with encryption, it's not a clear win. The weighting leans heavily towards encryption, I grant you, but there are downsides strong enough to warrant needing to consider if it is truly adding enough to make up for what it takes away. It remains situational.
True, though as I have said (and as the recent article posted from InfoWorld) if we can somehow move to a world where everything is encrypted, and there is little cost, that would be ideal, I think.
-
Considering the current political climate - I'm wondering how long until HIPAA is repealed because of it's leanings toward encryption. LOL
I say this in complete jest, but damn.. those fools!
-
I'm really torn in the discussion of a governmental backdoor to all encryption, as they want.
One one hand, I don't trust the government, and I do think we should be able to protect our data.
On the other hand, people always say "what if your child was abducted and the info was on the person's phone but they couldn't access it", or to be able to intercept terroristic threats.
So I see both sides.
Typically, though, I lean towards encryption.
-
And yet, when pressed for information that was obtained in places where they did manage to solve a crime because they broke/hacked/found password to encrypted files - they remain mute.
I really don't think they get as much as they want us to believe they could by decrypting everything.
Not only that - making the companies do this does NOTHING to actually help against someone who wants a real secure system - they simply will break the law and use products that don't have those back doors.
-
@BRRABill said:
I'm really torn in the discussion of a governmental backdoor to all encryption, as they want.
One one hand, I don't trust the government, and I do think we should be able to protect our data.
On the other hand, people always say "what if your child was abducted and the info was on the person's phone but they couldn't access it", or to be able to intercept terroristic threats.
So I see both sides.
Typically, though, I lean towards encryption.
Problem is that back doors can be used by abductors and terrorists too. It's not just by the government. And which is a bigger threat, terrorists or the government? Terrorists pose practically no threat. They make the news but cause very little damage. The government, however, is a major threat to freedom and safety. Giving the government access to that stuff doesn't only create safety, it takes it away too. The question is, how much does it do of which?
Anything that gives good guys access gives bad guys access. There is no technology that only helps good people.
-
So another question becomes, if you are okay with encryption that has a back door, are you really using encryption?
-
@scottalanmiller said:
So another question becomes, if you are okay with encryption that has a back door, are you really using encryption?
hence my quandary about HIPAA (even though it's not directly encryption related). lol
-
@scottalanmiller said:
So another question becomes, if you are okay with encryption that has a back door, are you really using encryption?
My feeling on encryption is really to prevent against the common thief.
I agree with you, once they have the physical system, you have no protection.