Key Escrow

Information Security Guideline


  1. This guideline is meant to provide assistance with key escrow, which is a method of storing keys (passphrases or passwords) used to encrypt and decrypt information so that they can be recovered if they are lost.
  2. This guideline has been issued by the Chief Information Officer to supplement the Cryptographic Controls standard. Compliance with this guideline is recommended, but not mandatory. Questions about this guideline may be referred to

Security and Privacy of Key Escrow

  1. Key escrow provides a secure and private method of recovering keys used to encrypt information.
  2. Key escrow cannot be used to track the location of an individual. The only IP address that is recorded is the IP address assigned by a wireless access point, which is typically non-routable (in the -, - or - ranges). These IP addresses are not unique and cannot be used to track a User’s location.
  3. Additionally, UBC’s encryption service is only accessible on campus or via VPN, which means that UBC can only record UBC-owned IP addresses; if Users connect from off-campus via the VPN, then the system would only record the IP address assigned by UBC.

UBC's Key Escrow Service

  1. The encryption packages that UBC IT is currently supporting offer key escrow services. These services are automatically enabled for all users of these encryption packages.
  2. After the key escrow service is enabled, Users may use it to recover keys at any time by calling the UBC IT Help Desk.

Alternatives to Key Escrow

  1. The following are alternatives to key escrow:
    1. use a Password Safe (see the Password Safe guideline for more information);
    2. print out the key and lock it in a safe;
    3. save the key file to a USB drive and lock it in a safe; or
    4. if using Apple's FileVault, read the following "Set a FileVault recovery key for computers in your organization" article (

Related Documents and Resources

  1. Policy SC14, Acceptable Use and Security of UBC Electronic Information and Systems
  2. Cryptographic Controls standard

Guideline Last Revised: 2021-02