Higher Education Privacy Update

Slides:



Advertisements
Similar presentations
IT Security Policy Framework
Advertisements

University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Massachusetts privacy law and your business  Jonathan Gossels, President, SystemExperts Corporation  Moderator: Illena Armstrong  Actual Topic: Intersecting.
Herding Cats and Campuses: Addressing Distributed Security and Compliance Issues Educause Security Professionals Conference - April, 2007 Kathy Kimball.
Information & Communication Technologies NMSU All About Discovery! Risk-Based Information Security Program at NMSU presented by Norma Grijalva.
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Data Security At Cornell Steve Schuster. Questions I’d like to Answer ► Why do we care about data security? ► What are our biggest challenges at Cornell?
1 IT Security-related Legislation Judy Borreson Caruso CUMREC 2004 May 18, 2004 Copyright Judy Borreson Caruso, This work is the intellectual property.
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
© 2003, EDUCAUSE/Internet2 Computer and Network Security Task Force Computer Access, Privacy and Security: Legal Obligations and Liabilities Rodney J.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
INFORMATION SECURITY REGULATION COMPLIANCE By Insert name dd/mm/yyyy senior leadership training on the primary regulatory requirements,
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Electronic Records Management: What Management Needs to Know May 2009.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
CU – Boulder Security Incidents Jon Giltner. Our Challenge.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
IT Security Challenges In Higher Education Steve Schuster Cornell University Copyright Steve Schuster This work is the intellectual property of.
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Computer Policy and Security Report to Faculty Council Jeanne Smythe ATN Director for Computing Policy March 26,2004.
By, CA K RAGHU, PAST PRESIDENT – INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Pioneers in secure data storage devices. Users have become more accustomed to using multiple devices, are increasingly mobile, and are now used to storing.
Performing Risk Analysis and Testing: Outsource or In-house
Strategies in the Game of
Information Security Program
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
إدارة الأعمال الإلكترونية عمادة التعلم الإلكتروني والتعليم عن بعد
Educause/Internet 2 Computer and Network Security Task Force
Information Technology Sector
Regulatory Compliance
Compliance with hardening standards
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
Auditing Cloud Services
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Information Security based on International Standard ISO 27001
Information Security: Risk Management or Business Enablement?
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Institutional Privacy Challenges
General Counsel and Chief Privacy Officer
Red Flags Rule An Introduction County College of Morris
Consumer Privacy An Introduction
Enterprise Risk Management
Cyber Trends and Market Update
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Drew Hunt Network Security Analyst Valley Medical Center
Technical Issues with Establishing Levels of Assurance
Information Technology Organization Overview RFP #220-05
Presentation transcript:

Higher Education Privacy Update David Lindstrom, Chief Privacy Officer The Pennsylvania State University Ross Janssen, Privacy and Security Officer University of Minnesota

Session Overview Higher Ed Characteristics Legal, Regulatory, and Other Reasons to Protect Data Trends The Challenges Facing Us A Couple of Approaches Questions (and Answers?) - what we look like - info we use – we deal with a lot of data - culture - technical competencies Higher Ed Characteristics: Certain Characteristics of Colleges and Universities Make the Security Problem More Difficult Distributed Governance Varying User Needs/User Populations Cultural Tradition of Independence Emphasis on committees and consensus Comparatively slow-moving process facing a fast-moving threat The legal and regulatory framework - are entrusted with data - expectations

Characteristics Multiple Missions Decentralization Limited or Competing Resources Culture of Independence Diverse Technical Competencies Lots of Data – “Big Pipes”

How Much Data??? Typical Day: more than 100,000 individual computers are connected > 1.5 million authentication actions by 120,880 unique Access account users Doesn’t include all the College and Department logins 28 February: More than 54,000 systems (of the 100,000) communicated out to the Internet More than 2,900,000 separate systems attempted to “talk to” Penn State from the Internet 10% of the traffic coming from the Internet to Penn State that day was blocked by filtering at the border. (In other words, it was likely hostile activity subject to very simple blocks)

Some Characteristics Make Us More Vulnerable: Distributed Governance Varying User Needs/User Populations Cultural Tradition of Independence Emphasis on Committees and Consensus Relatively slow-moving process facing a fast moving threat

Why Should Higher Ed Care? Data Integrity Intellectual Property People Place Trust in Us Impacts Reputation High Cost for Breaches US Data Protection Framework Fed and state laws being passed in reaction to publicized data use problems Federal Laws (examples): FERPA (education data) GLBA (banking data & credit decisions) HIPAA (identifiable health information) CAN-SPAM (email communications) State Privacy and Notification Laws Regulations and Standards: FDA data security compliance e-Discovery

We are Having Breaches Two sources with slightly different numbers, but the news isn’t good: Educational institutions accounted for over 50 of the more than 300 major data breaches in 2006, according to the Privacy Rights Clearinghouse, exposing Social Security numbers, bank account information and other sensitive personal data According to the Treasury Institute for Higher Education “…of the 321 information security breaches nationwide reported in 2006, 84 – or 26% – were at education institutions. This 26% share for Education is particularly disproportionate when we consider that education represents only a small percent of total payment activity nationwide. As a result, financial institutions and card issuers increasingly view education institutions as risky merchants”

US Data Protection Framework Federal and State Laws (to name a few:) FERPA HIPAA GLBA State Notification Laws Regulations and Standards: FDA data security compliance PCI-DSS Fed and state laws being passed in reaction to publicized data use problems Definitely more coming.

Trends – What’s Increasing? Sophistication level of network attacks (Bots, bots and more bots) Complexity of detecting and removing residual malicious software Number of vendor security updates Mobility Laptops and PDA’s connecting to uncontrolled networks and returning Amount of Data We Can Store Accountability Losses and Thefts

Consider This:

Trends: What’s Decreasing Amount of time for global spread (worms) Ability to prevent intrusions at the network border Amount of time available to install vendor security updates Amount of time to detect and defeat a network-based attack Customers’ patience

Higher Ed Challenges Making improvements in a distributed environment. (Is the tail wagging the dog?) Educating our workforce and students about data security and institutional expectations (We must raise the bar).

Challenges (cont.) Ability to respond to new laws. Balancing security with innovation and exploration. Compliance in an academic culture Research Faculty and staff creativity and use of powerful computer resources with limited security knowledge. Using tools with dangerous power.

You’re Going to Make Us Do What? Initial Reaction by the Governed: Like herding cats

Two Approaches The Penn State Information Privacy And Security Project (IPAS) The University of Minnesota’s Privacy and Security Project

Information Privacy and Security Project Privacy and Security Assessment 2006 No lack of existing institutional policies and laws No lack of requirements for departments No lack of internal guidance No enforcement No consequences for non-compliance outside of HIPAA components

www.ipas.psu.edu Proposal for a two-year project Funded and supported by the Provost and Senior Vice President for Finance and Business University-wide project with 3 internal staff reassigned First priority, Payment Card Industry, Data Security Standards verification Second priority, distributed network compliance

U of M: Privacy & Security Project Academic Chain of Command Policies and Procedures Funded Program Consolidated IT function Auditing and Monitoring Appropriate Sanctions in place Education and Awareness

U of M: Privacy & Security Project (cont.) Education and Awareness is critical Educate users about institutional expectations. Educate users about good IT practices. Enhance productivity through standard practices.

Future Directions/Expectations Remarkable recognition of the need for enhanced “CENTRAL” services Increased accountability Shift in the academic paradigm of open environment and limited central oversight (expect culture shock) Enhance similarity between administrative system controls and academic-centric data systems Increased Standardization

Questions? djl6@psu.edu janss006@umn.edu