Privacy and Security Challenge "Private" Benjamin For the Record Top Secret Green Eggs and Spam Hi ho, hi ho it's of to FOIP I go 100 200 300 400 500.

Slides:



Advertisements
Similar presentations
Protect Our Students Protect Ourselves
Advertisements

POSSIBLE THREATS TO DATA
Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
Woodland Hills School District Computer Network Acceptable Use Policy.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
Information & Compliance UL University of Limerick & UL employees obliged to comply with certain legislation, including: Freedom of Information.
FERPA 102 Helpful Guide for Administrators, Security Contacts and Support Staff Prepared by the Office of the Registrar Student Records: Institutional.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Developing a Records & Information Retention & Disposition Program:
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Record Management Medical Center Administrative Group Fall Symposium November 15, 2000 University Audit.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Practical Information Management
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
1.1 System Performance Security Module 1 Version 5.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Privacy and Information Management ICT Guidelines.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
University Health Care Computer Systems Fellows, Residents, & Interns.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Protecting Students on the School Computer Network Enfield High School.
Information Systems Security New Faculty Orientation Day Queen’s University August 2011 George Farah, GIAC/GSEC Gold, CRISC, CISA University Information.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Computer Security By Duncan Hall.
Security and Ethics Safeguards and Codes of Conduct.
RECORDS MANAGEMENT TRAINING. WHAT HAS RECORDS MANAGEMENT GOT TO DO WITH ME? Records management is everyone’s responsibility. The three examples which.
Woodland Hills School District Computer Network Acceptable Use Policy.
Cybersecurity Test Review Introduction to Digital Technology.
FOIA Processing and Privacy Awareness at NOAA Prepared by Mark H. Graff NOAA FOIA Officer OCIO/GPD (301)
Data Access & New Banner Admin UI Professional Development Session May 11, am Presented by: Management Information Center.
Privacy and Security Challenge Just Browsing Keep out - Private! Pushing IT You sound like a broken record Legal Beagles
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Everything Electronic
Protect Our Students Protect Ourselves
Explaining strategies to ensure compliance with workplace legislation
Cybersecurity Awareness
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Privacy & Access to Information
Move this to online module slides 11-56
Network and Internet Security and Privacy
Introduction to Records Management, FOI & Data Protection
Finham Primary School – GDPR Practice Guidelines
– Communication Technology in a Changing World
Information Security Awareness
General Data Protection Regulations 2018
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Good Spirit School Division
Presented by Elizabeth Kunkel Member Service Trainer
Move this to online module slides 11-56
Woodland Hills School District
Family Educational Rights and Privacy Act of 1974
Presentation transcript:

Privacy and Security Challenge "Private" Benjamin For the Record Top Secret Green Eggs and Spam Hi ho, hi ho it's of to FOIP I go

This term refers to personally identifiable information that a person would have reasonable expectation to not be available publically. "Private" Benjamin - 100

These can be used to "profile" your Internet activity, not just to dunk in milk. "Private" Benjamin - 200

Privacy complaints in Saskatchewan are directed to this official. "Private" Benjamin - 300

These are the two primary pieces of privacy legislation that the Government of Saskatchewan must adhere to. "Private" Benjamin – 400

This should be completed to review programs, projects, or new systems for potential privacy issues or concerns. "Private" Benjamin - 500

This represents all information, regardless of format, related to government business held by a government institution. For the Record - 100

This is the minimum length of time required to keep a record, as determined by an approved schedule. For the Record - 200

This legislation, passed in 2004, deals with the management and preservation of public records in the province of Saskatchewan. For the Record - 300

The period of time from a record's creation or receipt, through its active use to its approved disposal. For the Record - 400

This is a government-wide standard that was passed in 2006 incorporating a classification system with a retention schedule for records. For the Record - 500

This is one of the most basic means of protecting the information you have access to. Keep it secret. Keep it safe. Not on a sticky note on your monitor. Top Secret - 100

The name of your pet, a date of birth, or your favourite car are all examples of this. Top Secret - 200

This is how organizations should try to improve staff knowledge and reduce the risk of threats. Top Secret - 300

Applications like Limewire, Kazaa, and Gnutella that enable people to connect directly to a computer to illegally share music, pictures and other copyright materials as well as potentially access confidential files. Top Secret - 400

This is the most successful kind of attack a person can engage in to compromise an organization's security, including contacting an employee directly to get certain information. Top Secret - 500

When you leave your computer unattended, even for a short period of time, you should do this. Green Eggs and SPAM - 100

This term refers to ensuring no confidential paperwork is left unattended in your workspace. Green Eggs and SPAM - 200

This is unsolicited, is sent electronically, and is considered annoying by most people. Green Eggs and SPAM - 300

This is used to "scramble" the contents of files to make it much more difficult for an unauthorized person to use them. Green Eggs and SPAM - 400

This tactic uses links to false websites that lure users and then collect usernames, passwords and other personal information. Green Eggs and SPAM - 500

The law in Saskatchewan that allows an individual a right to access his or her personal information. Hi ho, hi ho it's of to FOIP I go - 100

This is the office an individual can request a review to if he or she is not happy with the outcome of his or her access to information request. Hi ho, hi ho it's of to FOIP I go - 200

The number of days government has to respond to a formal access to information request. Hi ho, hi ho it's of to FOIP I go - 300

The way an individual applies for access to records under The Freedom of Information and Protection of Privacy Act. Hi ho, hi ho it's of to FOIP I go - 400

The current Information and Privacy Commissioner for Saskatchewan. Hi ho, hi ho it's of to FOIP I go - 500

What is private? "Private" Benjamin - 100

What are Cookies? "Private" Benjamin - 200

Who is the Information and Privacy Commissioner? "Private" Benjamin - 300

What are the Freedom of Information and Protection of Privacy Act (FOIPPA) and the Health Information Protection Act (HIPA)? "Private" Benjamin - 400

What is a Privacy Impact Assessment (PIA)? "Private" Benjamin - 500

What is a government record? For the Record - 100

What is a retention period? For the Record - 200

What is The Archives Act? For the Record - 300

What is the life cycle of a record? For the Record - 400

What is the Administrative Records Management System (ARMS)? For the Record - 500

What is a password? Top Secret - 100

What is a weak password? Top Secret - 200

What is Privacy and Security Awareness? Top Secret - 300

What is peer-to-peer (P2P) software? Top Secret - 400

What is social engineering? Top Secret - 500

What is lock your computer? Green Eggs and SPAM - 100

What is clean desk? Green Eggs and SPAM - 200

What is spam? Green Eggs and SPAM – 300

What is encryption? Green Eggs and SPAM - 400

What is phishing? Green Eggs and SPAM - 500

What is The Freedom of Information and Protection of Privacy Act? Hi ho, hi ho it's of to FOIP I go - 100

What is the Office of the Information and Privacy Commissioner? Hi ho, hi ho it's of to FOIP I go - 200

What is thirty (30) days? Hi ho, hi ho it's of to FOIP I go - 300

What is by completing a formal application form (or access to information form)? Hi ho, hi ho it's of to FOIP I go - 400

Who is Gary Dickson? Hi ho, hi ho it's of to FOIP I go - 500