Security Awareness Training: System Owners

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
MN PRIMA: 2014 Data Practices Presentation Stacie Christensen, Director Information Policy Analysis Division, Admin.
Environmental Management System (EMS)
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
SL21 Information Security Board Mission, Goals and Guiding Principles.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
Information Security Awareness April 13, Motivation Recent federal and state regulations and guidance Recent federal and state regulations and guidance.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Data Ownership Responsibilities & Procedures
Financial Data Protection and Consumer Notification of Data Security Breach Act of 2006 Sara Juster, JD Vice President/Corporate Compliance Officer Nebraska.
Security Controls – What Works
Information Security Policies and Standards
VITA [Virginia Information Technologies Agency]
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
Information Systems Security Officer
Documentation Management Biosafety and Biosecurity Awareness Training For Afghan and Pakistani Bioscientists January 12-14, 2010 SAND No P Sandia.
Computer Security: Principles and Practice
Stephen S. Yau CSE , Fall Security Strategies.
Session 3 – Information Security Policies
Network security policy: best practices
CSP Annual Security Training Miranda Gregory, CSP Analyst Carroll County Department of Citizen Services.
Incident Response Updated 03/20/2015
June 6, 2007 TAC Meeting NERC Registration Issues Andrew Gallo, Assistant General Counsel, Litigation and Business Operations ERCOT Legal Dept.
Peer Information Security Policies: A Sampling Summer 2015.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
AUDITING INFORMATION SYSTEMS SECURITY. AUDIT OF LOGICAL ACCESS USE OF TECHNIQUES FOR TESTING SECURITY USE OF INVESTIGATION TECHNIQUES.
Security Awareness Norfolk State University Policies.
INFORMATION SECURITY REGULATION COMPLIANCE By Insert name dd/mm/yyyy senior leadership training on the primary regulatory requirements,
General Awareness Training
Information Security Issues at Casinos and eGaming
Evolving IT Framework Standards (Compliance and IT)
Electronic Records Management: What Management Needs to Know May 2009.
HIPAA PRIVACY AND SECURITY AWARENESS.
SECURITY POLICIES Indu Ramachandran. Outline General idea/Importance of security policies When security policies should be developed Who should be involved.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Risk Management, Assessment and Planning Committee III-4.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
General Awareness Training Security Awareness Module 3 Take Action! Where To Go for Help.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Instructional & Information Technology Services Fall, Activities and Updates Teresa Macklin Information Security Officer Information Security.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
1 PARCC Data Privacy & Security Policy December 2013.
Approved for Public Release. Distribution Unlimited. 1 Government Privacy Rick Newbold, JD, MBA, CIPP/G Futures Branch 28.
An introduction to records management at Clemson University Records Center is located at the Library Depot 103 Clemson Research Blvd Anderson, S.C
BY: Winston G. Smith Environmental Engineer UST/PCB & OPA Enforcement & Compliance Section EPA Region 4.
ISO CONCEPTS Is a management standard, it is not performance or product standard. The underlying purpose of ISO 1400 is that companies will improve.
Checking and Corrective Action EPA Regions 9 & 10 and The Federal Network for Sustainability 2005.
State of Georgia Release Management Training
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
7/7/20161 The Public Sector Equality Duty for Schools in England Jonathan Timbers – Policy Manager, PSED Team, Equality and Human Rights Commission.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Special Publication Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations Dr. Ron Ross Computer Security.
Information Security Board
Chapter 3: IRS and FTC Data Security Rules
Red Flags Rule An Introduction County College of Morris
Final HIPAA Security Rule
Security Awareness Training: Data Owners
County HIPAA Review All Rights Reserved 2002.
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Introduction to the PACS Security
Presentation transcript:

Security Awareness Training: System Owners

Definition VITA 501-01 2.2.7, p. 7 The System Owner is the agency business manager responsible for having an IT system operated and maintained. With respect to IT security, the System Owner’s responsibilities include the following: 1. Require that the IT system users complete any system unique security training prior to, or as soon as practicable after, receiving access to the system, and no less than annually, thereafter. 2. Manage system risk and developing any additional information security policies and procedures required to protect the system in a manner commensurate with risk. 3. Maintain compliance with COV Information Security policies and standards in all IT system activities. 4. Maintain compliance with requirements specified by Data Owners for the handling of data processed by the system. 5. Designate a System Administrator for the system.

Security Your responsibility Implement Security Controls Software Safeguards Access Controls Data Owner Requirements Who Type What permissions Approve access Remote Access Investigate unusual activities Notify affected users of Security Breach Ensure proper environmental controls are in place. Ensure systems are in secured locations Notify Data Owner of breach System hardening Baseline Security on all systems Additional Security on all systems Review

Communication The Data Owner decides the sensitivity level and level of protection for the data, communicating it to you, the system owner Designate and direct the System Administrator in requirements to protect the data Work with the Data Owner on BIA Notify Data Owner of breach Assist Data Owner in reviews

Risk Management & Business Continuity Participate in BIA with Data Owner Document Sensitive Systems Risk Assessment Approve backup schedule Approve emergency backup and operations restoration plans SEC501-01 Sect 4.2.2: Security Plan requirements Include: Security Controls, current and planned How the controls mitigate risk Get Agency Head or ISO approval Revise if disapproved Update every three years

System Interoperability Section 4.4.2 of SEC501-01 Document Systems with shared data Type Data flow Contact info Written agreement with security requirements Specify how data is stored System Owner agrees to abide by legal requirements System Owner’s authority to approve access Approve and enforce Inform others who share the system or data to include new shares

Other Security Considerations Phishing/Social Engineering Data Disposal Password requirements SSN and Credit Card number communication