Information Security and Privacy Office

Slides:



Advertisements
Similar presentations
Protect Our Students Protect Ourselves
Advertisements

FERPA: Family Educational Rights and Privacy Act
Mandatory training for all Users who have access to Privacy Act Data
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
Overview of the Privacy Act
Gaucho Round-Up FAQ’s This presentation covers some of the FAQ’s about campus clean-up day. Presentation #4 2/3/
Office of Health, Safety and Security
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Protecting the Confidentiality of Social Security Numbers Business Procedures Memorandum 66 Revised November 1, 2006 The University of Texas System.
SIU School of Medicine Identity Protection Act and Associated SIU Policy.
Critical Data Management Indiana University HR Summit April 24, 2014.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
The Privacy Office U.S. Department of Homeland Security Washington, DC t: ; f: Safeguarding.
Data Classification & Privacy Inventory Workshop
PRIVACY TRAINING 101 CIA-PPI-PII
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
DEED WorkForce Center Reception and Resource Area Certification Program Module 2 Unit 1b: WorkForce Center System II Learning Objectives III.
Privacy Act 101 Orientation training for all Military Members, Civilian Employees, and Contractor Personnel.
DEFENSE PRIVACY & CIVIL LIBERTIES OFFICE Safeguarding Personally Identifiable Information (PII) Samuel P. Jenkins Director for Privacy Defense Privacy.
Protecting Sensitive Information PA Turnpike Commission.
PRIVACY SAFEGUARDS ANNUAL TRAINING FY 2011 previous next Office of Management Privacy, Information and Records Management Services Privacy Safeguards Division.
Electronic Records Management: What Management Needs to Know May 2009.
1 DEFENSE LOGISTICS AGENCY AMERICA’S COMBAT LOGISTICS SUPPORT AGENCY DEFENSE LOGISTICS AGENCY AMERICA’S COMBAT LOGISTICS SUPPORT AGENCY WARFIGHTER SUPPORT.
PRIVACY AND INFORMATION SECURITY ESSENTIALS Information Security Policy Essentials Melissa Short, IT Specialist Office of Cyber Security- Policy.
Ames Laboratory Privacy and Personally Identifiable Information (PII) Training Welcome to the Ames Laboratory’s training on Personally Identifiable Information.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
INFORMATION TECHNOLOGY SERVICES Privacy 101 Information Security and Privacy Office.
Privacy and Information Management ICT Guidelines.
Family Educational Rights and Privacy Act. From the moment a child enters the school system, sensitive information is collected about the child (and even.
FERPA: What you Need to Know The Family Educational Rights and Privacy Act & SEI.
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
Privacy Act United States Army (Managerial Training)
FOIA Processing and Privacy Awareness at NOAA Prepared by Mark H. Graff NOAA FOIA Officer OCIO/GPD (301)
DON Code of Privacy Act Fair Information Principles DON has devised a list of principles to be applied when handling Protected Personal Information (PPI).
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
HIPAA Privacy What Every Staff Member Needs to Know.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Health Insurance Portability and Accountability Act (HIPAA) Primer for Observers, Volunteers, Medical Students Dr. Michael Palumbo- Privacy Officer/ EVP.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Protect Our Students Protect Ourselves
HIPAA Privacy and Security
Protecting PHI & PII 12/30/2017 6:45 AM
UW-Madison Guidelines for Managing the Records of Departing Employees*
Privacy & Information Security Basics
Privacy and Security Basics for Falls Evidence Based Programs Data Collection . October 2016.
FERPA Fundamentals The Family Educational Rights and Privacy Act (FERPA) sets out the rights and responsibilities associated with student education records.
Privacy and Security Basics for CDSME Data Collection
Office of Health, Safety and Security
Privacy principles Individual written policies
Information Security Awareness
FOIA, Privacy & Records Management Conference 2009
PERSONAL DATA PROTECTION ACT 2010
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
HIPAA & PHI TRAINING & AWARENESS
Good Spirit School Division
General Data Protection Regulation Q & A Session
Examples of Personal Data Requiring Protection
PERSONALLY IDENTIFIABLE INFORMATION: AUDIT CONSIDERATIONS
Protecting Student Data
The Health Insurance Portability and Accountability Act
Presentation transcript:

Information Security and Privacy Office

PRIVACY TRAINING

Purpose of this training What you Need to Know about Safeguarding Protected Personal Information and Personally Identifiable Information (PPI/PII) and the Confidentiality, Integrity and Availability (CIA) of Data. To focus on the importance of PRIVACY and to ensure all personnel are aware of the vital role that they must play in ensuring CIA and that PPI/PII is properly protected from unauthorized disclosure.

Protection of the Confidentiality, Integrity, and Availability (CIA) of Information

Definitions Confidentiality: That data/information is accessible only to those authorized to have access Integrity: Assurance that data and information are consistent and correct, not only from the origination point, but also when transferred to another point Availability: The timely and reliable access to data services for authorized users. Availability ensures that information or resources are available when required, while protecting confidentiality ensuring the integrity of the data is maintained

“PPI” stands for Protected Personal Information DEFINITIONS “PPI” stands for Protected Personal Information “PII” stands for Personally Identifiable Information PPI and PII are interchangeable PPI/PII is: Information which can be used to identify a person uniquely and reliably, including but not limited to name, SSN, address, telephone #, e-mail address, mother’s maiden name

Current Issues - Ignorance and apathy towards information/data CIA and associated guidance - Lack of standard processes to handle sensitive information and not following established processes for handling information - Lack of understanding of how the network and electronic filing can protect data and information - Lack of training about proper handling of information/data

Personally Identifiable Information (PII) PII is defined as follows: “Personal Information. Information that identifies, links, relates, or is unique to, or describes him or her, e.g. a Social Security Number; age; military rank; civilian grade; marital status; race; salary; home/office phone numbers; other demographic, biometric, personnel, medical, and financial information, etc. Such information is also known as personally identifiable information (i.e., information which can be used to distinguish or trace an individual’s identity, such as their name, Social Security Number, data and place of birth, mother’s maiden name, biometric records, including any other personal information which is linked or linkable to a specified individual).”

Why You Need to Know About Privacy We are collecting, maintaining, distributing and disposing of information about individuals--YOU! The law requires you to take precautions when collecting, maintaining, distributing and disposing of PPI/PII The Privacy Act of 1974 contains both civil and criminal penalties for non-compliance.

The Department of Veterans Affairs Breach The VA loss of thousands of veterans’ records was well publicized, costly and brought PRIVACY to the forefront This breach resulted in Presidential and Congressional interest in PRIVACY Office of Management & Budget (“OMB”) established working groups to address better protections, notification protocols, costs, and actions to be taken against employees

Your Role in PRIVACY You must understand the importance of ensuring that PPI/PII is properly protected You must get involved in identifying best practices for protecting PPI/PII You must be aware of the consequences for non-compliance

Privacy Act Requirements Establish rules of conduct for collecting, maintaining, distributing, and disposing of personal information Publish Privacy Act system of records notices in the Federal Register for all approved collections of privacy information Ensure that we collect only data that is authorized by law & that we share information only with those who have a need-to-know

Privacy Act Requirements Establish and apply data safeguards to protect information from unauthorized disclosure Allow individuals to review records about themselves for completeness and accuracy & to amend any factual information that is in error Keep record of disclosures made outside to authorized “routine users” described in the system notice

Examples of Personal Data Requiring Protection Financial, credit and medical data Security clearance level Leave balances; types of leave used Home address & telephone numbers, personal e-mail address Social Security Number Mother’s maiden name; other names used

Examples of Personal Data Requiring Protection Drug test results & fact of participation in rehabilitation program Family data Religion, race, national origin Performance ratings

The Loss of PPI/PII Can be embarrassing & cause emotional distress. Can lead to identity theft, which is costly to the individual and to FSU Can impact our business practices & result in actions being taken against an employee Can erode confidence in FSU’s ability to protect information

Collecting PPI/PII If you collect it--you must protect it! If in doubt, leave it out! Do you really need the entire SSN or will the last 4 digits serve as a second qualifying identifier? Moving from a paper process to an electronic process requires you to identify any breach risks.

Think PRIVACY When Safeguarding PII Need to address whether collection & maintenance of all the information that we collect is “relevant and necessary,” and whether we can maintain “timely and accurate” information. The CIO/CISO/CPO may need to conduct a Privacy Impact Assessment (“PIA”) of electronic system to identify vulnerabilities.

Best Practices Think PRIVACY when considering the PII that you store on your computer, memory stick, PDA, etc. Think PRIVACY when you send/receive e-mails that contain PII--are these messages properly marked? “FOR OFFICIAL USE ONLY-PRIVACY SENSITIVE-Any misuse or unauthorized access may result in both civil and criminal penalties.”

Best Practices Any email messages that contain PII/PPI must contain the proper markings AND be ENCRYPTED! Any PII/PPI that is contained or maintained on “mobile” equipment (PDAs, Cell Phones, memory sticks etc.) must be ENCRYPTED!

Best Practices Think PRIVACY when you create documents--do you need to include the entire SSN? Think PRIVACY when placing documents in public folders in Outlook and on public web sites. Think PRIVACY when disposing of PII--use cross-cut shredding, if possible.

Your Responsibilities Do NOT collect personal data without authorization. Do NOT distribute or release personal information to other employees unless they have an official need-to-know. Do NOT be afraid to challenge anyone who asks to see PA information. Do NOT maintain records longer than permitted.

Your Responsibilities Do NOT destroy records before disposal requirements are met. Do NOT place unauthorized documents in PA systems of records. Do NOT commingle information about different individuals in the same file. Do NOT transmit personal data without ensuring that it is properly marked.

Your Responsibilities Do NOT use interoffice envelopes to mail Privacy data. Do NOT place privacy data on shared drives, multi-access calendars, the Intra or Internet that can be accessed by individuals who do not have an official need-to-know. Do NOT hesitate to offer recommendations on how to better manage Privacy data.

Specific FSU Policies and Procedures

Leadership’s Responsibility for Data Develop polices, procedures and standards to protect/safeguard information and data. Enforce the policies, procedures and standards through training and oversight. Be an active participant in information CIA, e.g. walk the talk, set the example, and identify areas of improvement. Ensure everyone receives initial orientation training and refresher training each year.

Individual Responsibility for Data Carefully consider the information you need to do your job, i.e. do you need SSNs, addresses, birthdates, etc. Know and understand polices, regulations, and guidance.

Individual Responsibility for Data If you must use sensitive information, determine who needs to see it and protect it accordingly. Set up a folder that allows only those that must have access to it and the level of access, e.g. Read/Write, or Read only. If sending sensitive information via email, use the Encryption feature. When printing sensitive information on shared printers, pick up immediately and protect it. Delete any files containing sensitive information when they are no longer needed. Hard copies need to be shredded when no longer needed.

Identification of Creator/Modifier of Information Every file has a log that indicates when it was created, when it was modified and the identity of the person. To ensure your identify is correctly listed, you must do the following: - Word: Open up a blank document. Go to File, then Options. Select the “User Information” tab. Type in your name and initials in the space provided. Hit OK. - Excel: Open up a blank document. Go to File, then Options. Select the “General” tab. Type in your name in the space provided. Hit OK. - PowerPoint: Open up a blank document. Go to File, then Options. Select the “General” tab. Find User Information. Type in your name and initials in the space provided. Hit OK.

Files Created and Stored Locally Containing Personal Information Any information containing personal information (electronic or hard copy) must be: Protected from unauthorized access Deleted when no longer needed Identify the person that created it Process for protecting from unauthorized access: Use the minimum personal information required Determine who needs to access the information, if anyone, other than yourself