Information Security January 2016. What is Information Security?  Information Security is about the physical security of our equipment and networks as.

Slides:



Advertisements
Similar presentations
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, TRAINING /DATA PROTECTION LAW.
Advertisements

Data Protection.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
PRIVACY COMPLIANCE An Introduction to Privacy Privacy Training.
1.3 Control of Information In this section you must be able to: Describe the legal rights and obligations on holders of personal data to permit access.
Information Governance
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Data Protection Act.
Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1
An overview of the Data Protection Act Legal framework The Data Protection Act 1998 came into force in March 2001, replacing the Data Protection.
Data Protection for Church of Scotland Congregations
Higher Administration
Practical Information Management
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
HIPAA PRIVACY AND SECURITY AWARENESS.
IT Security for Users By Matthew Moody.
Data Protection and You Your Rights & The Law Registration Basics Other Activities Disclaimer: This presentation only provides an introductory info. Please.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Ames Laboratory Privacy and Personally Identifiable Information (PII) Training Welcome to the Ames Laboratory’s training on Personally Identifiable Information.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
ISO27001 Introduction to Information Security. Who has day-to-day responsibility? All of us! Why Information Security? Control risk, limit liability What.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
Advanced Secure Technologies Secure Document Technologies.
ICT Homework- ICT Security Consultant PowerPoint.
Data Protection for Church of Scotland Congregations.
12/12/2015 Data Protection Act /12/2015 The DP Act A law that protects personal privacy and upholds individual’s rights Anyone who handles personal.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
SCHOOLS FINANCE OFFICERS MEETINGS Records Management, “Paper-Lite” Environments and Procedures when a school closes Elizabeth Barber.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Data protection—training materials [Name and details of speaker]
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
LITHUANIAN CRIMINAL POLICE BUREAU Crimes in Cyberspace – Relevant Issues and Investigation Challenges ID Thefts – Issues, Legal Regulation, International.
-1- WORKSHOP ON DATA PROTECTION AND DATA TRANSFERS TO THIRD COUNTRIES Technical and organizational security measures Skopje, 16 May - 17 May 2011 María.
Introduction to Data Protection Plan »Brief Introduction to Data Protection  Example  Principles  P3, 4, 7  Sensitive Data  Conditions for Processing.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
Information Security and Privacy in HRIS
Pioneers in secure data storage devices. Users have become more accustomed to using multiple devices, are increasingly mobile, and are now used to storing.
Tony Sheppard Mobile Guardian
HIPAA Privacy and Security
E&O Risk Management: Meeting the Challenge of Change
COMP3357 Managing Cyber Risk
Data protection for law firms Wednesday 13 July 12pm
Data Protection Session
Data Protection Act.
GDPR – What’s it all about???
Data Protection Legislation
Data Protection Scenarios
INFORMATION GOVERNANCE
New Data Protection Legislation
The new data protection rules
Data Protection Managing risk is not just about health and safety and insurance. It’s about data protection too. New stricter data protection legislation.
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
How we’ll prepare for the General Data Protection Regulation (GDPR)
INFORMATION GOVERNANCE
COMP3357 Managing Cyber Risk
Keeping your data, money & reputation safe
Ransomware and Data breaches in public libraries
Understanding Data Protection
General Data Protection Regulation Q & A Session
Handling Information Securely
Privacy and Security Basics Training
Presentation transcript:

Information Security January 2016

What is Information Security?  Information Security is about the physical security of our equipment and networks as well as safeguarding the information (data) that we hold.  Councillors’ responsibilities As processors of personal information, Councilors are data controllers having responsibility for the data you process / store All councillors are register with the ICO, the authority pays the annual £35 fee.

UK data breach examples Prison fined £180K for losing portable hard drive 644.gov.uk, websites hacked since 2004 Sensitive Social care documents found on internet Council fined for USB stick data loss

Data breaches – ICO figures  1,665 UK data breaches investigated in 2014  £5,823,500 issued in Monetary Penalty Notices  25 Million people affected by breaches  Reporting is still not mandatory in many sectors e.g. Private sector This may change with a new EU directive  Actual breaches will be much higher  ICO can issue an undertaking which ensures improvement Criminal offence if breached Can also issue Monetary Penalty up to £500K

Council Data breaches  Payroll data lost in car park Consultant stored payroll data on unencrypted memory stick Member of public found them and handed them in  Children’s services ICO breach Sensitive data posted to wrong person No procedural controls existed to prevent this ICO fined the Council £60,000  Direct Payments containing financial details for 511 people sent to 395 people Incident reported to ICO Featured on Herald front page, several complaints received from public  Council compromised using Outlook Web Access Used to send phishing s to external recipients

Council Data breaches - Trend 2015 Statistics

Recent improvements made  Secure print has reduced the number of printing errors 75% reduction in 2014  80% of staff have completed the data safe eLearning course  Incident reporting process has been improved  Information Commissioners Office (ICO) engaged to perform data security audit 70% of recommendations implemented  Management Information Security Forum, (MISF) Relaunched Attendees at initial meeting from Chief Execs, Finance, Public Health, Dem Support, CareFirst, Legal, Children’s Services, Youth Service, ELAFS, Customer Services, HR

What are the risks?  Paper documents Poor manual handling of documents Not checking what is in a pile of documents Enabling people to view documents in public places Giving people the wrong documents Insecure disposal of documents  All can lead to unauthorised people accessing information they are not entitled to

What are the risks?  Electronic documents Clicking on Phishing s can install malware Malware gives access to council network or logs keystrokes Files stored on unencrypted memory sticks / hard drives Sensitive data being sent by to incorrect place  Impact for electronic files can be larger, due to larger volume of files involved in breaches.

Why is the Council at risk?  We hold lots of data about our citizens. Financial details Bank details, credit card details Health information Child protection information Educational information  The council is seen as an easy target by some people Councils are viewed as not having the resources to implement high security  The Council is connected to national government networks Could be used as an easy access point  The Council has a very public profile As such it is a natural target for some people

What you can do  Protect the paper documents under your control  Ask yourself if it is necessary to carry Council data around  Know where your data is being put electronically  Only use Council supplied equipment to process Council data Keep party political information separate  Report any breach to ICT & Information Governance Manager Take action to reduce impact Recover any lost document  Read the Information Security booklet for Councillors

Data Breaches