Using VeraCrypt Encryption Software

Encryption is the process of altering a document so it cannot be opened without a password. VeraCryptan encryption software makes digital files unreadable except to people who have the passwords to open them. Faculty and staff using laptops or mobile devices that contain sensitive information, WIN, Social Security numbers, grades, financial or research information, etc., should install VeraCrypt to protect their files.

VeraCrypt can also be used to open legacy TrueCrypt containers. We recommend that anyone using TrueCrypt transition to using VeraCrypt.

VeraCrypt uses the terms VeraCrypt fileVeraCrypt container, and VeraCrypt volume to describe the file used to store encrypted data. These instructions will use the term VeraCrypt container.

A VeraCrypt container:

  • Can be moved, copied, duplicated, backed up, or deleted just like any file or folder. If set up correctly, a VeraCrypt or its copies cannot be opened without a password.
  • Can only be opened with VeraCrypt and the password you set.
  • When opened, can have files copied or saved into it, files modified in it, and files copied or deleted from it.
  • Looks like another hard drive on your computer when opened. The files in it become encrypted when the virtual drive (i.e., container) is dismounted, or you quit the VeraCrypt program.

Do not delete the VeraCrypt container or lose your password. If you do, the files you've placed in the container can never be opened again. 

Mac Users

Windows Users