Data Security Policies

Slides:



Advertisements
Similar presentations
IT Security Policy Framework
Advertisements

University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Today’s Schools face:  Numerous State and Federal Regulations  Reduced Technology Funding  More Stringent Guidelines for Technology Use.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
SIU School of Medicine Identity Protection Act and Associated SIU Policy.
Auditing Computer Systems
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Payment Card Industry (PCI) Data Security Standard
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
FERPA Family Educational Rights and Privacy Act and Rebecca Macon Registrar University of Georgia Presentation for GASFAA October.
CPS Acceptable Use Policy Day 2 – Technology Session.
Electronic Records Management: What Management Needs to Know May 2009.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
Student Confidentiality: The FERPA/HIPAA Facts AISD Policy Student Records AISD Procedure AP. 11.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
0 Managing Student Records Legally and Effectively Tiffany Hogue Provost’s Office Spring 2009.
HIPAA Health Insurance Portability and Accountability Act of 1996.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
ISO/IEC 27001:2013 Annex A.8 Asset management
The Georgia Open Records Act and ferpa
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Board of Directors – March 24, 2016 Denise Mannon, AHFI, CHPC Corporate Compliance Officer.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Nassau Association of School Technologists
Payment Card Industry (PCI) Rules and Standards
FERPA AND HIPAA COMPLIANCE AS COMMUNITY PARTNERS
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
Privacy & Confidentiality
Providing Access to Your Data: Handling sensitive data
HIPAA.
Obligations of Educational Agencies: Parents’ Bill of Rights
Electronic Records Management Program
Introduction to the Federal Defense Acquisition Regulation
PERSONAL DATA PROTECTION ACT 2010
Red Flags Rule An Introduction County College of Morris
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Employee Privacy and Privacy of Employee Information
Welcome to the FERPA training for Faculty and Staff.
County HIPAA Review All Rights Reserved 2002.
CompTIA Security+ Study Guide (SY0-401)
The Health Insurance Portability and Accountability Act
Colorado “Protections For Consumer Data Privacy” Law
The Health Insurance Portability and Accountability Act
Presentation transcript:

Data Security Policies NC IIPS - 2017 Winter Conference

Presenters Rod Brower Chief Information Officer Sandhills Community College Jakim Friant Infrastructure Team Manager Cape Fear Community College

Why have a Data Security Policy? Required by Standards Protect Important Data Local Data Usage Storage Sharing Transmitted Data Permission to Share What can be Shared How it can be Shared

Policies Governing Data Security Federal Level FERPA HIPAA State Level NC DIT Policy IIPS Standard Local Level Focus for today: State Level -- IIPS Standard Local Level -- College Policy

IIPS Standard Security requirements as defined by NCCCS IIPS

IIPS Standard: 030203 Controlling Data Distribution and Transmission 1 of 3 IIPS Standard: 030203 Controlling Data Distribution and Transmission Purpose: To protect the College’s data and information from unauthorized disclosure. STANDARD Technical access controls or procedures shall be implemented to ensure that data and information are distributed only as authorized and as appropriate. Access controls and/or procedures shall, in part, be based on college business requirements. Once a business justification is provided, personnel shall adhere to the following standards: Confidential information should not be stored on personally owned devices. If information includes both confidential data and data available for public inspection, the classification level shall default to confidential. Electronic media entering or leaving offices, processing areas or storage facilities shall be appropriately controlled. Storage areas and facilities for media containing confidential data shall be secured and all filing cabinets provided with locking devices.

IIPS Standard: 030203 Controlling Data Distribution and Transmission 2 of 3 IIPS Standard: 030203 Controlling Data Distribution and Transmission Confidential information shall not be supplied to vendors, contractors or other external organizations without properly executed contracts and confidentiality agreements specifying conditions of use, security requirements and return dates. When confidential information is shipped, the delivery shall be verified. All confidential information shall be encrypted when transmitted across wireless or public networks1, including transmissions such as FTP and electronic mail. Confidential data shall be encrypted when stored on non-State owned devices and only by authorized users. Federally protected confidential data shall not be stored on non-State owned/managed devices. 1) For the purpose of this standard, a public network includes the State Network. It does not apply to internal College networks. Internal College networks are considered private networks.

IIPS Standard: 030203 Controlling Data Distribution and Transmission 3 of 3 IIPS Standard: 030203 Controlling Data Distribution and Transmission Encryption algorithms for the transmission of confidential data include, at a minimum, Secure Socket Layer (SSL) RC4 128 bit algorithms, SSL Server-Gated Cryptography (SGC) 128 bit algorithms, TLS 1.11 128 bit algorithms, or those algorithms that are accepted and certified by the National Institute of Standards and Technology (NIST)2. 2) NIST http://csrc.nist.gov/groups/STM/cavp/index.html

IIPS Standard: 010101 Defining Information 1 of 2 IIPS Standard: 010101 Defining Information Purpose: To protect the College’s information. STANDARD Information includes all data, regardless of physical form or characteristics, made or received in connection with the transaction of public business by any College or State government. The College’s information shall be handled in a manner that protects the information from unauthorized or accidental disclosure, modification or loss. All Colleges shall maintain a comprehensive and up-to-date database of their information assets and periodically review the database to ensure that it is complete and accurate.

IIPS Standard: 010101 Defining Information 2 of 2 IIPS Standard: 010101 Defining Information Each College, through its management, is required to protect and secure the information assets under its control. The basic information requirements include, but are not limited to: Identifying information assets and maintaining a current inventory of information assets. Complying with applicable federal and state laws, such as the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and all applicable industry standards, such as the Payment Card Industry Data Security Standard (PCI DSS). Assessing the vulnerability and risk associated with information assets. Determining the value of information assets to the organization and the business processes they support. Providing the level of information protection for information assets that is appropriate to their vulnerability, risk level, and organizational value. Maintaining a business and disaster recovery plan with respect to information technology and process.

IIPS Standard: 010103 Storing and Handling Classified Information 1 of 3 IIPS Standard: 010103 Storing and Handling Classified Information Purpose: To protect the College’s Information, including information security records, through the establishment of proper controls. STANDARD The College’s information, data and documents shall be handled in a manner that will protect the information, data and documents from unauthorized or accidental disclosure, modification or loss. All information, data and documents must be processed and stored in accordance with the classification levels assigned to those data in order to protect their integrity, availability and, if applicable, confidentiality. The type and degree of protection required shall be commensurate with the nature of the information, the operating environment, and the potential exposures resulting from loss, misuse or unauthorized access to or modification of the data. A College that uses confidential information from another College shall observe and maintain the confidentiality conditions imposed by the providing College if legally possible. Colleges shall ensure that confidential information in electronic form is properly protected in transport or transmission.

IIPS Standard: 010103 Storing and Handling Classified Information 2 of 3 IIPS Standard: 010103 Storing and Handling Classified Information Special protection and handling shall be provided for information that is covered by statutes that address, for example, the confidentiality of financial records, taxpayer information and individual census data. The College shall manage and protect confidential information if provided to any external entity. The records disclosed that are confidential because the records disclose information technology security features shall be designated by affixing the following statement, “Confidential per G.S. §132-6.1(c)”, on each page. The College shall be committed to the concern for and the protection of students’ rights and privacy of information The College will comply with the provisions of the Federal Family Rights and Privacy Act (FERPA), which is a federal law that governs the maintenance of students’ records. Under law, students have the right to inspect their educational records, correct inaccuracies in the records, if warranted, and the records are protected from release of information without written consent. The parent(s) of a dependent student as defined in Title 26 U.S. C.s152 of the Internal Revenue Code also has this right to inspect records that are maintained by the College on behalf of the student.

IIPS Standard: 010103 Storing and Handling Classified Information 3 of 3 IIPS Standard: 010103 Storing and Handling Classified Information Confidential information technology security records shall be provided only to agencies and their designated representatives when necessary to perform their job functions. College shall ensure that confidential information is properly protected in transport or transmission. College shall ensure that all confidential information and related files under the college’s control in electronic format are handled properly and secured accordingly. Use of such information shall be in compliance with all applicable laws and regulations and limitations imposed by contract(s). Confidential information technology security records shall not be transmitted electronically over public networks unless encrypted while in transit. See standard 030203 – Controlling Data Distribution and Transmission for the minimum requirement for encrypting data in transit. Employees who are provided access to information technology security records shall sign a non-disclosure agreement that includes restrictions on the use and dissemination of the records. Colleges shall ensure that legal and business risks associated with contractors' access are determined, assessed and appropriate measures are taken. Such measures may include, but are not limited to, non-disclosure agreements, contracts, and indemnities.

Local Policy Example From CFCC Process: Data Sharing Request initiated by a Department Questionnaire Sent to Vendor and Dept Reviewed by IT Services and the Information Technology Committee

Data Sharing Agreement This document defines the requirements for a department at your school and also the requirements that should be met by the vendor. Policy and procedures as defined by your college and governed by the other standards that colleges are required to follow.

Data Sharing Agreement: Questions for the Department The department initiating the request is asked to consider the following… Purpose Regulations Data Flow Data Disposal

Data Sharing Agreement: Questions for the Vendor The vendor is asked to respond with details on how they will protect the data that is being sent to them… Organizational Oversight Data Security Process for Reporting Problems

Examples at CFCC Financial Aid -- uses HTTPS upload Human Resources -- SFTP and preshared keys (host and user) NC State -- Email encrypted with GnuPG Concessions -- Dropbox account Registrar -- OneDrive shared file

Questions?