Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.

Slides:



Advertisements
Similar presentations
Protect Our Students Protect Ourselves
Advertisements

HIPAA Security.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
USDA Rules of Behavior User Training
Privacy and Information Security Training ( ) VUMC Privacy Website
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
HIPAA Health Insurance Portability and Accountability Act.
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
Critical Data Management Indiana University HR Summit April 24, 2014.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
DEED WorkForce Center Reception and Resource Area Certification Program Module 2 Unit 1b: WorkForce Center System II Learning Objectives III.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
HIPAA Privacy & Security EVMS Health Services 2004 Training.
Protecting Sensitive Information PA Turnpike Commission.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
HIPAA PRIVACY AND SECURITY AWARENESS.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
University Health Care Computer Systems Fellows, Residents, & Interns.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Children’s Hospital Requirements for Remote Access.
Why Respect Privacy and Confidentiality? Access to Confidential Information (OP ) Protection and Security of Protected Health Information (OP.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
® HHM Clean Desk Policy. 2 ® Clean Desk Policy : What Will You Learn Importance of Privacy and Security The kinds of information we protect Privacy Requirements.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Privacy Act United States Army (Managerial Training)
Ticket Training Tuesday Properly Safeguarding Personally Identifiable Information (PII)
Board of Directors – March 24, 2016 Denise Mannon, AHFI, CHPC Corporate Compliance Officer.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Health Insurance Portability and Accountability Act (HIPAA) Primer for Observers, Volunteers, Medical Students Dr. Michael Palumbo- Privacy Officer/ EVP.
Information Security Awareness Training
Protect Our Students Protect Ourselves
Protecting PHI & PII 12/30/2017 6:45 AM
Privacy and Security Basics for Falls Evidence Based Programs Data Collection . October 2016.
East Carolina University
Privacy and Security Basics for CDSME Data Collection
Protection of CONSUMER information
Privacy & Confidentiality
HIPAA Basic Training for Privacy and Information Security
Chapter 3: IRS and FTC Data Security Rules
Move this to online module slides 11-56
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
County HIPAA Review All Rights Reserved 2002.
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
HIPAA Overview.
Information Security Training
The Health Insurance Portability and Accountability Act
HIPAA & PHI TRAINING & AWARENESS
Lesson 3: Medical Records
Move this to online module slides 11-56
HIPAA Do’s and Don'ts: What is Really Behind Protected Health Information (PHI) and Health Care Privacy Rules Paul Sisler, Director, Information Services;
Protecting Student Data
The Health Insurance Portability and Accountability Act
School of Medicine Orientation Information Security Training
Family Educational Rights and Privacy Act of 1974
Presentation transcript:

Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program

Goals and Objectives  Define Personally Identifiable Information (PII)  Recognize the responsibility of access to PII  Discover best practices to deter PII violations  Illustrate how to identify PII loss  Demonstrate procedures to report a PII loss  Employ proper communication procedures while working with PII 2

Message from the Chief Information Officer  Provides security guidance for SSA employees, contractors, DSS employees and government partners who handle SSA information  Reminder to properly safeguard personally identifiable information from loss, theft or inadvertent disclosure and to immediately notify management of any PII loss.  PII includes: person’s name, date of birth SSN, bank account information, address, health records and Social Security benefit payment data. 3

Improper Safeguards Non-Secure areas in your environment include:  An office where the public visits  Public spaces  An unlocked room  An unattended desk  Computers without password protection  Storage devices (flash drives, CD, etc) that others have access to (non-password protected) 4

 Public space  Unlocked car  One one’s desk  Public locations  A computer with no password protection  A flash drive  A compact disc  Unlocked room  An unattended desk Examples of non secure spaces 5

Best Practices Every individual from users to managers of SSA’s automated systems are required to follow agency rules for using SSA systems. 6

Best Practices to Deter PII violations  Be familiar with current information on security, privacy and confidentiality practices  Obtain written authorization before using sensitive or critical applications.  Use only systems and data for which they have authorization.  Lock or logoff their workstation/terminal prior to leaving it unattended.  Act in an ethical, informed and trustworthy manner.  Protect sensitive electronic records  Be alert to threats and vulnerabilities to their systems 7

Responsibility of Managers  Monitor the use of mainframes, PCs, LANs, and networked facilities to ensure compliance with national and local policies  Ensure that employee screening for sensitive positions within their components has occurred prior to any individual being authorized access to sensitive or critical applications.  Implement, maintain and enforce systems security standards and procedures 8

Responsibility of Managers Continued  Explain to employees that they are responsible for protecting personal information at all times, both on and off duty.  Permit employees to access PII only when they need to do their jobs and to disclose it only when appropriate  Train employees to handle PII responsibly and remind them periodically of their responsibilities to protect all PII they use to complete their work  When taking records or laptops offsite, lock them in the car’s trunk. Do not leave them in the passenger compartment. 9

Management of Technology  Do NOT send personal information via unless it is encrypted. This includes using any PII in the subject or body.  Send reports and documents containing PII via regular mail or send them to a secure FAX location.  Use password protection and encryption software to protect confidential files from unauthorized access. 10

Management of Technology Continued  Choose a password that others cannot guess and change it frequently.  Protect with encryption those peripheral data storage devices such as CDs and flash drives with records containing PII.  Encrypt files with PII before deleting them from your computer or peripheral storage device. This will ensure that unauthorized users cannot recover the files.  Lock or log off the computer when leaving it unattended. 11

Identifying PII Loss 12

How to Identify PII Loss in Communications  An unencrypted sent with a beneficiary's name, SSN, address, phone number or initials.  Receiving a request via with a beneficiary’s name, SSN, address, phone number or the initials of a beneficiary. 13

How to Identify PII Loss in the Work Area  A co-worker left out a document with personal information on an unattended desk.  A co-worker moved from their computer that is displaying PII without turning off the monitor or removing the material from the screen.  Leaving a document with PII unattended at a printer. 14

Reporting a PII Loss  Notify a supervisor/manager in your chain of command.  Manager will complete the “SSA Personally Identifiable Information violation form”.  Manager will the completed form to the Quality Assurance Coordinator at TPM.  TPM will then report to SSA.

Proper Communication with PII  Through the Ticket Portal  Fax the Ticket Program Manager:  Telephone call  Encrypted  U.S. mail

Questions? Contact: Lisa Whitaker, Quality Assurance Coordinator Phone: