Overview What is a privacy breach? 2. Examples of privacy breaches 3. Consequences of privacy breaches 4. Steps to handling a privacy breach.

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

What we all need to know. Approval Date: April 30, 2012 Approved by: President's Council.
Data Security Breach Code of Practice. Data Security Concerns Exponential growth in personal data holdings Increased outsourcing 3 rd countries cloud.
HIPAA Health Insurance Portability and Accountability Act of 1996
Data Protection Law In India iPleaders and Intelligent Legal Risk management LLP.
Red Flag Rules: What they are? & What you need to do
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
NAU HIPAA Awareness Training
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
Data Protection.
Privacy (or Data) Breaches - Examples South Carolina Department of Revenue Hackers got into the SCDOR’s computers, and stole information on up to 3.2 Million.
Computers, Freedom and Privacy April 23, 2004 Identity Theft: Addressing the Problem in California Joanne McNabb, Chief CA Office of Privacy Protection.
The Privacy Office U.S. Department of Homeland Security Washington, DC t: ; f: Safeguarding.
PRIVACY COMPLIANCE An Introduction to Privacy Privacy Training.
Data Classification & Privacy Inventory Workshop
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Protecting Sensitive Information PA Turnpike Commission.
Practical Information Management
Access & Privacy It’s Everybody’s Business Renée Pendergast Manager, Access to Information Office Department of Justice October 6, 2008.
1Copyright Jordan Lawrence. All rights reserved. Annual In-House Symposium Practical Steps to Minimize Privacy Risks: Understanding The Intersection.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Enterprise data (decentralized control, data security and privacy) Incident Response: State and Federal Law Rodney Petersen Security Task Force Coordinator.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Florida Information Protection Act of 2014 (FIPA).
Georgia Department of Human Services Division of Aging Services (DAS): Data Breach Presenter:Harold Johnson Acting General Counsel Presentation to: Board.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Protecting Your Organization Identity Theft and Data Breach.
Patient’s Rights -A Notice of Privacy Practices -A copy of their own Protected Health Information -Request an amendment to health records -Request an Accounting.
Privacy & Confidentiality
Privacy Challenges for Condominium Corporations and Condominium Managers presented to the Association of Condominium Managers of Alberta by Carmen Mann,
WHO’s IN YOUR “WALLET” WHO’s IN YOUR “WALLET” YOU BETER “RECOGNIZE” YOU BETER “RECOGNIZE” STEPPING $2o0 $300 $400 $500 $400 $300 $200 $500 $400 $300.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
IM NETWORK MEETING 20 TH JULY, 2010 CONSULTATION WITH 3 RD PARTIES.
12/12/2015 Data Protection Act /12/2015 The DP Act A law that protects personal privacy and upholds individual’s rights Anyone who handles personal.
e-Learning Module Credit/Debit Payment Card Acceptance and Security
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
We’ve Had A Breach – Now What? Garfunkel Wild, P.C. 411 Hackensack Avenue 6 th Floor Hackensack, New Jersey Broadway Albany,
Protecting Your Assets By Preventing Identity Theft 1.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
Data Security Survival Skills for 21 st Century Evaluators Teresa Doksum & Sean Owen October 17, 2013.
Understanding Privacy An Overview of our Responsibilities.
Canada’s Breach Reporting Law What you need to know Timothy M. Banks, CIPP/C Dentons Canada LLP July 21, 2015.
Understanding Privacy An Overview of our Responsibilities.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
PHI Breach PHI Breach Dealing Breach With HIPAA Guidelines Guidelines.
Protecting Your Assets By Preventing Identity Theft
SOCIAL ENGINEERING.
Florida Information Protection Act of 2014 (FIPA)
Notifiable data breaches Roundtable
Privacy Breach Response and Reporting
Protecting Your Identity:
Cyber Issues Facing Medical Practice Managers
Move this to online module slides 11-56
By Joseph Carnevale, CIP Partner & Director of Sales
The Nelson Medical Practice Privacy Notice
How we’ll prepare for the General Data Protection Regulation (GDPR)
Mandatory Breach Reporting (isn’t *that* bad)
General Data Protection Regulation Q & A Session
Move this to online module slides 11-56
ประกาศกระทรวงอุตสาหกรรม ฉบับที่ 5292 (พ.ศ. 2562)
School of Medicine Orientation Information Security Training
Presentation transcript:

Overview What is a privacy breach? 2. Examples of privacy breaches 3. Consequences of privacy breaches 4. Steps to handling a privacy breach

1. What is a Privacy Breach? A privacy breach occurs when there is unauthorized access, collection, use disclosure or disposal of personal information.

2. Examples of Privacy Breaches Revealing the name of an applicant on an Access to Information Request Sending personal information to the wrong: Fax number Mailing address Email Accessing personal information improperly

2. Examples of Privacy Breaches Nova Scotia (April 2016) Spa owner had similar fax number to mental health referral line Went to CBC after receiving dozens of referral notices containing patient name, phone number and notes on mental health Records were received over a ten year time period

2. Examples of Privacy Breaches Eastern Health (March 2016) Clerk caught snooping in patient files, ‘no longer employed’ at Eastern Health Fines (2014) Nurse at Eastern Health fined $1,000 for inappropriately accessing patient files Accounting Clerk at Western Health fined $5,000 for accessing files

3. Consequences of Privacy Breaches Less trust in organization Risk of embarrassment to individuals Risk of identity theft or financial loss (SIN and Credit Card)

4. How to Handle a Privacy Breach Step 1 – Contain the Breach Step 2 – Evaluate the Risks Step 3 – Notify Step 4 - Prevent

4. How to Handle a Privacy Breach Step 1 – Contain the Breach Take steps to limit the breach Eg. If you realize you sent an email to the wrong person, call the person and ask them to delete it

4. How to Handle a Privacy Breach Step 2 – Evaluate the Risks Determine what information was breached and how What are the risks? Sensitivity of information Number of people affected Risk of identity theft, financial loss

4. How to Handle a Privacy Breach Step 3 – Notification Required to notify individuals if there is a risk of significant harm. Notify ATIPP Office and Privacy Commissioner’s office of any privacy breaches

4. How to Handle a Privacy Breach Step 4 – Prevent How can similar breaches be prevented?

Contact For more information contact the ATIPP Office at 729-7073 or toll free at Tel: (877) 895-8891 or email atippoffice@gov.nl.ca Privacy Breach reporting forms available at: http://www.oipc.nl.ca/pdfs/PrivacyBreachIncidentReportForm.pdf