Chapter 8 Data Privacy. Data Collection IP addresses Visited urls Anonymized? If so, supposed to prevent personal identification Europe considers IP address.

Slides:



Advertisements
Similar presentations
Electronic Evidence Joe Kashi. Todays Program Types of Electronically stored information Types of Electronically stored information Accessibility and.
Advertisements

Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
© 2009 The McGraw-Hill Companies, Inc. All rights reserved 3-1 LEGAL AND ETHICAL ISSUES in Medical Practice, Including HIPAA PowerPoint® presentation.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
11 Section D: SQL  SQL Basics  Adding Records  Searching for Information  Updating Fields  Joining Tables Chapter 11: Databases1.
Chapter 11 Privacy Policies and Behavioral Marketing.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Retention How State and Federal policies can impact local districts.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
Data Retention LIS 550 Winter 2010 Unsworth Tuesday, March 02, 2010.
1 E-Discovery Changes to Federal Rules of Civil Procedure Concerning Discovery of Electronically Stored Information (ESI) Effective Date: 12/01/2006 October,
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA Health Insurance Portability & Accountability Act of 1996.
Threats to I.T Internet security By Cameron Mundy.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Privacy Aziz Doumith Michael Kot Luis Pacheco Emory Petermann Wyatt Pierson Henry Stigler.
General Awareness Training
HIPAA PRIVACY AND SECURITY AWARENESS.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Health Insurance Portability and Accountability Act (HIPAA)
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 7, 2015 DRAFT1.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
R ed F lag R ule Training for the Medical Industry © Chery F. Kendrick & Kendrick Technical Services.
© Copyright 2011, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers. ® CISO Executive Network Executive Breakfast.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Medical Manager Unit 9 ICBS 170. Medical Manager Electronic Data Interchange (EDI)  Ability to request, receive, transfer and integrate information electronically.
Network Security & Accounting
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
1 Trustworthy Browsing Ian Moulster Software + Services Lead Microsoft Ltd.
Checking & Savings Accounts Economics What is a Checking Account?  Common financial service used by many consumers (a place to keep money)  Funds.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
HIPAA PRIVACY & SECURITY TRAINING
Facebook privacy policy
Protection of CONSUMER information
Personal spaces.
GDPR – What’s it all about???
Red Flags Rule An Introduction County College of Morris
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Health Care: Privacy in a Digital Age
GDPR (General Data Protection Regulation)
HIPAA Overview.
Figure 1. Number of Records Breached
The Health Insurance Portability and Accountability Act
HIPAA & PHI TRAINING & AWARENESS
Move this to online module slides 11-56
Introduction to the PACS Security
Presentation transcript:

Chapter 8 Data Privacy

Data Collection IP addresses Visited urls Anonymized? If so, supposed to prevent personal identification Europe considers IP address personal information PgP BUSA331 Chapter 8

ISP Subscriber Information Links IP address to individual subscriber Info may be needed for litigation/prosecution Balance anonymous free speech with opponents reputation Courts rule both ways… PgP BUSA331 Chapter 8

Search Engine Queries Retain lots of info Search string, date, time, IP address… May store cookie that can track subsequent searches Imagine if Joe McCarthy had access to this data in the 1950’s! Bush administration trying to obtain search engine records…scary… PgP BUSA331 Chapter 8

Data Retention Deleting ISP log files permissible but Electronic Communication Transactional Records Act of 1996 requires ISP to retain records for 90 days upon request of government entity Bush administration wanted to go further… SAFETY bill, retain records FOREVER! Mark Foley sponsor, how ironic PgP BUSA331 Chapter 8

EU Data Retention Retention policies of 6 months to 2 years (country dependent) UK had issue with FaceBook not deleting photos, only unlinking Problem-longer data retention policy increases risk of data being stolen or misused No standard yet PgP BUSA331 Chapter 8

Data Breach Most businesses take inadequate security measures Most hackers use state of the art technology Best defense-encrypt data-while in transit and in storage PgP BUSA331 Chapter 8

Data Breach Types Intrusion Accidental Disclosure Insider Breach Portable Device Breech Stationary Device Breech Hard Copy Loss Payment Card Fraud PgP BUSA331 Chapter 8

Data Breach Consequences ARRA-American Recovery and Reinvestment Act HITECH-Health Information Technology for Economic and Clinical Health HIPAA-Health Insurance Portability and Accountability Act PgP BUSA331 Chapter 8

Metadata Metadata-data about data Background at GRC.com (Metadata)Metadata Typically created in conjunction with computer files-text documents (next slide) Discoverable and could be valuable to an opposing party Federal Rules of Civil Procedure Consider stripping metadata from files Be mindful of any litigation holds PgP BUSA331 Chapter 8

Metadata Example-Word Doc PgP BUSA331 Chapter 8

Data in the Wrong Hands Consider who else may have access to an account People share accounts, passwords Committees share accounts Wire Shark - A network protocol analyzer that lets you see what is happening on your network at a microscopic level. PgP BUSA331 Chapter 8

Public Wi-Fi and WireShark PgP BUSA331 Chapter 8

Data in the Wrong Hands Cloud computing Controlled by Policies and Procedures Who has physical access? Post termination conditions? Effect of third-party subpoena Where is the data, physically? Other electronic devices Camera memory cards Fax machines, copiers Smartphones PgP BUSA331 Chapter 8

Public Records Pre internet Almost inaccessible Post internet Easily accessible Egalitarian? Governments beginning to post online Employer background checks Data validity? PgP BUSA33115

Information Broker Liability Used to be private investigator Now collate public info Liability if info used by stalker? Boyer/Youens-yes PgP BUSA33116

Insurer Liability Not clear what circumstances insurer liable for dissemination of third party info Indemnity issues, so may be specific riders in future PgP BUSA33117