HP Client Security Commercial Managed IT Software
23 
HP Trust Circles 
The HP Trust Circles file and document security application combines folder file encryption with a 
convenient trusted-circle document-sharing capability. The application encrypts files placed in user-
specified folders, protecting them within a Trust Circle. Once protected, the files can be shared with anyone, 
but only those in the Trust Circle can truly access them. If a protected file is received by a non-member, the 
file remains encrypted, and the non-member cannot access the contents. 
Trust Circles prevents accidental data breach. Having a Trust Circle established between a user and his / her 
peers allows for near effortless secure data sharing, while also keeping the data at rest protected. No 
additional passwords required other than your Windows password to authenticate, or using additional 
credentials as allowed by session policies within HP Client Security. 
Data is encrypted at the file level. Depending on the usage scenario, a file is either presented encrypted or 
decrypted to applications. For example: when attaching a file to an email, the file is presented in encrypted 
form so the encrypted file will be attached, therefore ensuring protection.  
Once you have setup Trust Circles for your email you can begin to create Trust Circles. Contacts are invited 
by email to join a Trust Circle. 
There are two ways to send email invitations and to reply to them:  
1.  Using Microsoft® Outlook - Microsoft Outlook automates the processing of any Trust Circle invitations and 
responses from other Trust Circle users. 
2.  Using Gmail, Yahoo, Outlook.com or other email services (SMTP) - when you enter your name, email address, and 
password; Trust Circles uses your email service to send email invitations to the members selected to join your 
trust circle. 
Trust Circle invitations will include a link that they can click on to download free HP Trust Circles Reader or 
purchase HP Trust Circles Pro (http://hptc.cryptomill.com). 
Once members are confirmed, they will be able to read files you share with them that have been placed in 
that Trust Circle folder(s). If you should happen to send one of the encrypted files form the Trust Circle to 
someone that is not a member, they will not be able to read the file.  
Technology 
  User protected files (Word Docs, PDF’s, Excel, etc.) are encrypted using AES 128. 
  Internal Trust Circle information (including the Trust Circles encryption keys themselves) are encrypted using AES 
256. 
Limitations 
  HP Trust Circles Standard supports up to 5 Trust Circles each with a maximum of 5 members in each Trust Circle. 
  HP Trust Circles Reader, allows you to accept invitations sent out by HP Trust Circles users, and read encrypted 
files from Trust Circles of which you are a member. It cannot create a Trust Circle. 
  HP Trust Circles cannot protect system files or other parts of the operating system such as system folders and 
the recycle bin. 
Authentication 
  When installed with HP Client Security, authentication is handled through HP Client Security using one of the 
enrolled authentication methods. 
  When installed standalone without HP Client Security, Trust Circles uses your Windows Password for 
Authentication 










