{"id":3925,"date":"2020-01-22T14:13:14","date_gmt":"2020-01-22T05:13:14","guid":{"rendered":"https:\/\/hrcjapan.com\/personal-information-encryption-and-the-relocation-process\/"},"modified":"2025-08-28T11:34:40","modified_gmt":"2025-08-28T02:34:40","slug":"personal-information-encryption-and-the-relocation-process","status":"publish","type":"post","link":"https:\/\/hrcjapan.com\/en\/personal-information-encryption-and-the-relocation-process\/","title":{"rendered":"Personal Information, Encryption, and the Relocation Process"},"content":{"rendered":"<p>To start, a reminder that\u00a0Japan Info Swap\u00a0is a part of\u00a0The <a href=\"https:\/\/morethanrelo.com\/en\/home\/\" target=\"_blank\" rel=\"noopener noreferrer\">H&amp;R Group<\/a>, which provides a wide range of real estate, relocation, staffing, and life-enrichment service in Japan. This blog was created to help communicate the information, knowledge, and expert advice of the H&amp;R Group family of companies to their clients.<\/p>\n<p>The relocation process requires varying degrees of personal information, from immigration documents to housing contracts or driver&#8217;s licenses, so we have a lot on hand during our client&#8217;s relocation process, and our clients provided all of it to us, <a href=\"https:\/\/www.digitaltrends.com\/computing\/can-email-ever-be-secure\/\" target=\"_blank\" rel=\"noopener noreferrer\">usually by email<\/a>.<\/p>\n<p>As a result, we are understandably a bit paranoid about how this information is sent, stored, and eventually deleted.\u00a0 We can do a lot on our end. Still, we would feel a whole lot better if we could start on our client&#8217;s end instead and accomplish our work with full end-to-end encryption of the\u00a0personal information essential to completing the services initiated to us by our clients.<\/p>\n<h3><strong>What is Encryption?\u00a0<\/strong><\/h3>\n<p>Encryption changes information in such a way as to make it unreadable without a &#8220;key&#8221; that allows the information to be put back into its original, readable form.\u00a0\u00a0Encryption\u00a0allows us to securely protect data and ensure that only authorized parties will have access to it.<\/p>\n<p>We strongly recommend that our clients take the initiative and learn how to encrypt documents before sending them.\u00a0 It is easier than one might think, and it is our sincere hope that ancillary to their relocation our clients learn better personal data security habits that will protect them long after they have returned from Japan and forgotten about us.<\/p>\n<h3><strong>Encryption Sounds Hard&#8230;\u00a0<\/strong><\/h3>\n<p>You might think so, but it is pretty simple to do. The hardest part is securely communicating the password; more on that later.\u00a0 To begin with,\u00a0encrypting data is easily done using a \u201cdocument open password,\u201d which requires a user to type a password to open the document. We recommend three options that are probably installed on your computer, at least your office computer, already.<\/p>\n<ol>\n<li>Microsoft Word, Excel<\/li>\n<li>Adobe Acrobat (not reader)<\/li>\n<li>7-Zip<\/li>\n<\/ol>\n<p style=\"padding-left: 90px;\"><em>*Please not that &#8220;Microsoft passwords are not effective&#8221; is a common refrain, and true, if you are referring to edit or print passwords, which are notorious, but a &#8220;document open password&#8221; is different, and a powerful tool if used correctly with a strong password&#8230;more on that later.\u00a0<\/em><\/p>\n<p>Rather than explaining how to add a document open password in each platform, we will link to the explanations that these companies (or other entities) already offer for these software product&#8217;s encryption components.\u00a0 In short all you need is find the right pull-down or other menu item and enter a password, and that isn&#8217;t much of an oversimplification.<\/p>\n<h3><strong>Microsoft Encryption<\/strong><\/h3>\n<p>Office 2016 and 2013 provide for AES-256 encryption, which is very secure if a strong password is used. To encrypt a document using Microsoft Word or Excel, follow the instructions below.<\/p>\n<ul>\n<li><strong>Word 2016 \/ 2013<\/strong>\u00a0 \u00a0 \u00a0\u00a0<a href=\"https:\/\/support.office.com\/en-us\/article\/Password-protect-a-document-0e75c77e-dfab-419d-97d1-62c8ea10f874\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/support.office.com\/en-us\/article\/Password-protect-a-doc&#8230;<\/a><\/li>\n<li><strong>Excel 2016 \/ 2013<\/strong>\u00a0 \u00a0 \u00a0\u00a0<a href=\"https:\/\/support.office.com\/en-us\/article\/Protect-an-Excel-file-7359d4ae-7213-4ac2-b058-f75e9311b599\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/support.office.com\/en-us\/article\/Protect-an-Excel-file&#8230;<\/a><\/li>\n<li><strong>Office 2010<\/strong>\u00a0(AES- 128)\u00a0 \u00a0 \u00a0<a href=\"https:\/\/support.office.com\/en-us\/article\/Add-or-remove-protection-in-your-document-workbook-or-presentation-05084cc3-300d-4c1a-8416-38d3e37d6826?ui=en-US&amp;rs=en-US&amp;ad=US\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/support.office.com\/en-us\/article\/Add-or-remove-protection&#8230;<\/a><\/li>\n<\/ul>\n<h3><strong>Adobe Encryption<\/strong><\/h3>\n<p>Adobe Acrobat Professional offers unbreakable 256 encryption from version 10 (X), which is very secure if a strong password is used. To encrypt a document using Adobe Acrobat Professional, follow the instructions below.<\/p>\n<ul>\n<li><a href=\"https:\/\/helpx.adobe.com\/acrobat\/using\/securing-pdfs-passwords.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/helpx.adobe.com\/acrobat\/using\/securing-pdfs<\/a>&#8230;<\/li>\n<\/ul>\n<h3><strong>7-Zip\u00a0Encryption<\/strong><\/h3>\n<p>7-Zip is a free and open-source file archiver, a utility used to place groups of files within compressed containers known as &#8220;archives.&#8221;\u00a0 You may be familiar with &#8220;WinZip,&#8221; which is similar and also offers an encryption option.\u00a0 If sending multiple documents, adding them all to a password protected and encrypted &#8220;archive&#8221; file is the most convenient way of sending them securely.<\/p>\n<p>7-Zip is available for download, for free, here,\u00a0<a href=\"https:\/\/www.7-zip.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.7-zip.org<\/a><\/p>\n<ul>\n<li><a href=\"http:\/\/www.medicalnerds.com\/how-to-encrypt-zip-files-securely-using-7zip\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.medicalnerds.com\/how-to-encrypt-zip-files&#8230;<\/a><\/li>\n<\/ul>\n<h3><strong>Passwords<\/strong><\/h3>\n<p>&#8220;Cracking&#8221; AES-256 encryption is currently impossible&#8230;for now, ( though who knows what the NSA or China can do that they are not telling us about&#8230;).\u00a0 Cracking the older AES-128 encryption is possible but would cost a lot of money, and likely only a government or large (and exceptionally well funded) criminal organization would attempt it.\u00a0 And why would they?\u00a0 There is a far more straightforward way to get that data most of the time.<\/p>\n<p>Cracking an encrypted file or online account&#8217;s weak PASSWORD is far easier than most people understand by &#8220;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Password_cracking\" target=\"_blank\" rel=\"noopener noreferrer\">brute force<\/a>&#8221; or &#8220;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Dictionary_attack\" target=\"_blank\" rel=\"noopener noreferrer\">dictionary<\/a>&#8221; attacking the password. Without exaggeration, if the password is not strong enough, an exceptionally bright child could crack it with software downloaded from the internet.<\/p>\n<p><strong>No amount of encryption will protect a file or account unless a strong password is used<\/strong><\/p>\n<p>How long do you think these passwords will last against a supercomputer running brute force password cracking software against them??<\/p>\n<p style=\"padding-left: 90px;\"><strong>bob<\/strong><br \/>\n<em>less than 1 second<\/em><\/p>\n<p style=\"padding-left: 90px;\"><strong>bobb35<\/strong><br \/>\n<em>less than 1 second<\/em><\/p>\n<p style=\"padding-left: 90px;\"><strong>B0b35tel!<\/strong><br \/>\n<em>about 4 weeks<\/em><\/p>\n<p style=\"padding-left: 90px;\"><strong>^0@^@7KLk7W1Ud6<\/strong><br \/>\n<em>16 BILLION YEARS<\/em><\/p>\n<p style=\"padding-left: 90px;\"><strong>bobcat jerky heart dollar<\/strong> (<a href=\"https:\/\/www.xkcd.com\/936\/\" target=\"_blank\" rel=\"noopener noreferrer\">a \u201cmnemonic\u201d password<\/a>)<br \/>\n<em>8 SEPTILLION YEARS<\/em><\/p>\n<p>Granted, a supercomputer is hard to come by and expensive, but any computer will do it, if more slowly. You can test your password ideas with <a href=\"https:\/\/howsecureismypassword.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">this site<\/a>.\u00a0 Please note that you should probably not test your ACTUAL passwords&#8230;anywhere.<\/p>\n<h3><strong>Password Best Practices<\/strong><\/h3>\n<ol>\n<li><strong>Do not<\/strong> write down your passwords and ESPECIALLY don&#8217;t put them on post-it notes on the computer&#8230; I am looking at you here mom!<\/li>\n<li><strong>Do<\/strong> use a &#8220;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Password_manager\" target=\"_blank\" rel=\"noopener noreferrer\">password manager<\/a>.&#8221;\u00a0 We recommend &#8220;Lastpass&#8221; because you could actually share passwords directly with us through that system&#8230;which simplifies the process of communicating it to us securely; more on that later!<\/li>\n<li><strong>Do use<\/strong> the password manager&#8217;s &#8220;generate random password&#8221; feature to create <a href=\"https:\/\/pthree.org\/2011\/03\/07\/strong-passwords-need-entropy\/\" target=\"_blank\" rel=\"noopener noreferrer\">complex passwords of significant length<\/a>, at least 11 characters, but 25 would be better.\u00a0 Advances in computing tech mean that we must add one character per year to keep up with the bad folks ability to break them.\u00a0 Currently, that # is 11, but if you use a password manager, you wont have to remember your passwords anyway, so&#8230; I use the maximum amount of characters whatever I am encrypting will accept.<\/li>\n<li><strong>Do not<\/strong> use dictionary words, generally.<\/li>\n<li><strong>Do use<\/strong> dictionary words unless they are combined to create a &#8220;<a href=\"https:\/\/www.xkcd.com\/936\/\" target=\"_blank\" rel=\"noopener noreferrer\">mnemonic password<\/a>.&#8221;\n<ol>\n<li>used in bulk (dog aircraft coin payphone citadel)<\/li>\n<li>random (not: dog cat canary zebra monkey)<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<h3><strong>Communicating the Password<\/strong><\/h3>\n<p>One mistake that many people and companies make is to go through all the trouble of making an encrypted file and using a strong password, only to send the password AND the file through the same email account.\u00a0Sometimes they will take the extra step of sending the password in a separate email, but neither is a good idea.<\/p>\n<p>If someone has access to the email account, for example, it <a href=\"https:\/\/www.digitaltrends.com\/computing\/can-email-ever-be-secure\/\" target=\"_blank\" rel=\"noopener noreferrer\">gets hacked or an internet company has a rogue employee<\/a>, they can just open both emails.\u00a0 At best, this protects against accidental forwarding, which is helpful, I suppose.\u00a0 Otherwise, both emails are probably sitting in at least one sent items folder, an inbox, even the deleted items folder, waiting to be discovered, for longer than we are comfortable with.<\/p>\n<p>A better practice is sending the password via a separate channel, for example, SMS, Linkedin, Skype, or a phone call. It&#8217;s an extra step and honestly inconvenient, but it offers a MUCH higher level of security, and we think it is worth the effort to protect our clients.<\/p>\n<p>As mentioned earlier, our staff use Lastpass, and you can share a password directly to them from within that system as well.\u00a0 That keeps things very simple, but is still safe!<\/p>\n<h3><strong>More Reading and Resources<\/strong><\/h3>\n<p style=\"padding-left: 30px;\"><a href=\"https:\/\/howsecureismypassword.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">howsecureismypassword.net<\/a><\/p>\n<p style=\"padding-left: 30px;\"><a href=\"https:\/\/www.digitaltrends.com\/computing\/can-email-ever-be-secure\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.digitaltrends.com\/computing\/can-email-ever-be-secure<\/a><\/p>\n<p style=\"padding-left: 30px;\"><a href=\"https:\/\/www.xkcd.com\/936\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.xkcd.com\/936<\/a><\/p>\n<p style=\"padding-left: 30px;\"><a href=\"https:\/\/www.lastpass.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.lastpass.com<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>To start, a reminder that\u00a0Japan Info Swap\u00a0is a part of\u00a0The H&amp;R Group, which provides a wide range of real estate, relocation, staffing, and life-enrichment service in Japan. This blog was created to help communicate the information, knowledge, and expert advice of the H&amp;R Group family of companies to their clients. The relocation process requires varying [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":3926,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[60,61,166],"tags":[62],"class_list":["post-3925","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hr-group","category-relo-japan","category-the-internet","tag-login"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/hrcjapan.com\/en\/wp-json\/wp\/v2\/posts\/3925","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hrcjapan.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hrcjapan.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hrcjapan.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/hrcjapan.com\/en\/wp-json\/wp\/v2\/comments?post=3925"}],"version-history":[{"count":1,"href":"https:\/\/hrcjapan.com\/en\/wp-json\/wp\/v2\/posts\/3925\/revisions"}],"predecessor-version":[{"id":50398,"href":"https:\/\/hrcjapan.com\/en\/wp-json\/wp\/v2\/posts\/3925\/revisions\/50398"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hrcjapan.com\/en\/wp-json\/wp\/v2\/media\/3926"}],"wp:attachment":[{"href":"https:\/\/hrcjapan.com\/en\/wp-json\/wp\/v2\/media?parent=3925"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hrcjapan.com\/en\/wp-json\/wp\/v2\/categories?post=3925"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hrcjapan.com\/en\/wp-json\/wp\/v2\/tags?post=3925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}