17 Nov 2010
Taken from Appendix A of the deployment documentation... Removing / re-installing the encryption software   Once installed the encryption software cannot be removed by the end user or school.  To remove the…
21 Oct 2010
This FAQ explains what to do if a laptop protected by the encryption service is lost or stolen. Be reassured with the fact that all of your data on that device is…
16 Jul 2010
Who in a school can ask for a user recovery, i.e password reset... Ideally the user themselves should ring the Service Desk if they have problems with logging onto their laptop. Where…
25 Jun 2010
Summary: If you receive an error when attempting to login saying: "The isolation period has expired." you will need to log a call with the Service Desk who will follow this process...…
Note: Don't forget to log a call before re-encrypting a recovered/re-imaged device so that you don't create a duplicate device. Problem: When imaging an encrypted device with WDS you might find that it appears to…
5 May 2010
Please note that pre-requisites for installing encryption onto a mobile device require it to be fully backed up. We also recommend that (as with any date stored on a computer) the data…