NASA is scrambling to implement full disk encryption on agency laptops after one containing unencrypted personal information on a"large"number of people was recently stolen.
Agency employees were told of the October 31 theft of the laptop and NASA documents from a locked car in an email message Tuesday from Richard Keegan Jr.,associate deputy administrator at NASA.
Keegan told employees that the stolen laptop contained sensitive"Personally Identifiable Information"(PII)about a large number of NASA employees,contractors and others.
"Although the laptop was password pro
d,it did not have whole disk encryption software,which means the information on the laptop could be accessible to unauthorized individuals,"Keegan warned.
"We are thoroughly assessing and investigating the incident,and taking every possible action to mitigate the risk of harm or inconvenience to affected employees,"he added.
NASA has hired data breach specialist ID Experts to help notify all of the individuals affected by the breach,Keegan said.
Those whose personal data could be accessed by the crooks will receive free credit monitoring and identity theft monitoring services as well as an insurance reimbursement policy in case of identity theft.
NASA did not respond to a request for information on how many employees were affected,or why the agency waited nearly two weeks to disclose the breach.
The incident marks the second time this year that a NASA laptop containing unencrypted sensitive information was stolen.
In March,a laptop containing names,Social Security Numbers,phone numbers,email addresses,dates of birth,college GPAs and other personal data of NASA employees at NASA"s Kennedy Space Center was stolen from the car of a worker at the facility,according to NASA Watch.
That breach also impacted a large but unspecified number of employees.
The latest incident appears to have finally pushed NASA to mandate full disk encryption on laptops containing sensitive data.
In his alert,Keegan noted that NASA Administrator Charles Bolden and CIO Linda Cureton have issued a directive prohibiting the removal of computers from a NASA facility unless whole disk encryption is enabled or all sensitive files are individually encrypted.
The directive applies to all laptops containing PII,data on International Traffic in Arms Regulations(ITAR),Export Administration Regulations(EAR)data,procurement and human resources information,and other sensitive but unclassified(SBU)data,Keegan said.
CIOs at all NASA facilities have been instructed to complete disk encryption on the"maximum possible number of laptops"by Nov.21,Keegan said,and to add encryption capabilities to all laptops by Dec.21.After that date,no laptop from any NASA facility,unless whole disk encryption is enabled.