ITS

Information Technology Services
Information Technology Services

Requirements for Encryption

There is a three-step process in determining if your computer meets the requirements for encryption:

  1. Find out if your operating system supports encryption.
  2. Make sure your computer's hardware meets the requirements for encryption.
  3. Encrypt your computer by following the Do-it-yourself tutorials.

If  at any time you have a question, or need help, please contact the IT Support Centre to have a technician provide assistance.   


Step 1:  Find out if your operating system supports encryption

Certain operating systems that come pre-installed on computers do not have built-in encryption capabilities (for example, Windows 7 Home.) These computers will need to have the operating system upgraded to an encryption-capable operating system.

Follow the instructions to determine which operating system you are using, then consult the Operating System Compatibility Table to see if it is encryption capable.

To find out which operating system you are using:

Macintosh: As long as your Mac is running OS X 10.7 or newer, it meets the requirements for encryption. If you are running an earlier version of the Mac operating system, you will need to upgrade.

Windows: To find out what version of Windows you have installed on your computer, you need to access the System Control Panel.

Windows 10:

  • From the Start screen, start typing Winver (this will automatically open the search screen)
  • From the Search list, tap or click on Winver (the icon will be a computer)
  • The About Windows screen will open. The full version name will be displayed (Windows 8 Professional or Windows 8.1 Enterprise). Note: A Home version will not show the word "Home."
  • Check the Operating System Compatibility Table below to see if your operating system is encryption capable.

Windows 8.1:

  • From the Start screen, start typing System (this will automatically open the search screen)
  • From the Search list, tap or click on System (the icon will be a computer)
  • The System screen will open. The full version name will be displayed (Windows 8 Professional or Windows 8.1 Enterprise). Note: A Home version will not show the word "Home."
  • Check the Operating System Compatibility Table below to see if your operating system is encryption capable.

Windows 7:

  • Click on Windows Start
  • In the Start search box, enter System
  • The program list will open
  • Select System from the list
  • Check the Operating System Compatibility Table below to see if your operating system is encryption capable.

Operating System Compatibility Table

Operating System

Encryption Capable?

Mac OS X 10.7 or newer

Yes

Recommend free upgrade to Mac OS X 10.9.x

Windows 10 Home No
Windows 10 Pro,
Education and Enterprise
Yes

Windows 8.1

No

Please see What are my options...? below

Windows 8.1 Pro

Yes

Windows 8.1 Enterprise

Yes

Windows 8.1 RT

Yes

Device encryption is automatically enabled after first login with a Microsoft account.

Windows 8.0

Not Supported by ITS. 

Upgrade to Windows 8.1 Enterprise required.  Please see What are my options...? below

Windows 7 Home

No

Please see What are my options...? below

Windows 7 Pro

No

Please see What are my options...? below

Windows 7 Enterprise

Yes

Windows 7 Ultimate

Yes

What are my options if my operating system does not have encryption capabilities?

Macintosh: ITS supports Mac OS 10.7 and above. If you are running an earlier version of the Mac operating system, you will need to upgrade.

Windows: The operating system must be replaced with a copy of Windows with encryption capabilities (see Compatibility Table). Queen's is now licensed to provide Microsoft Windows Enterprise. These are available from MyQueen'sU to staff and faculty.

Step 2:  Make sure your computer's hardware meets the requirements for encryption

Macintosh hardware requirements

As long as your Mac is running OS X 10.7 or newer, it meets the requirements to be encrypted.

Windows hardware requirements

Windows 8.1:

  • A Trusted Platform Module (TPM) is recommended, however, Windows will allow you to use a dedicated USB key, or the option of simply entering a PIN password on boot-up.
  • Storage of the encryption Recovery Key is very important and should be printed and stored in a locked location.

Windows 7:

  • A Trusted Platform Module (TPM) is recommended, however, Windows will allow you to use a dedicated USB key.
  • Windows 7 does not allow a PIN password-only option.
  • Storage of the encryption Recovery Key is very important and should be printed and stored in a locked location.

If you need help with determining if your system has a TPM, please call the Support Centre at 613-533-6666 and we will be happy to help.

Step 3:  Encrypt your computer by following the Do It Yourself tutorial 

Once you have determined that your computer's operating system and hardware supports encryption, your can use the step-by-step  tutorials to encrypt your computer yourself. 

If you have any questions or if  you would prefer to have an IT Support Centre technician encrypt your computer for you contact the IT Support Centre

  • Contact us by calling 613-533-6666 during business hours
  • Or, fill out the online help form