Office of Information Security

Slides:



Advertisements
Similar presentations
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Advertisements

University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
HIPAA. Health Insurance Portability and Accountability Act.
HIPAA TRAINING to satisfy the training requirement for School District # 435 Staff.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
LEGAL CONSEQUENCES John Mullins 03/09/ POTENTIAL LIABILITIES IN SPORT Torts Law – negligence Contract law Statutory obligation - workplace health.
Non-Disclosure Agreements Antje Harnisch, Assistant Director, Office of Sponsored Programs Gianfranco Barbato,
Responsible CarE® Employee health and Safety Code David Sandidge Director, Responsible Care American Chemistry Council June 2010.
What is personally identifiable information (PII)? KDE Employee Training Data Security Video Series 1 of 3 October 2014.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Controller’s Division February Purchase Orders are processed by Supply Chain (Purchasing). Purchase Order Check Request P-card Check Requests are.
Protected Health Information (PHI). Privileged Communication An exchange of information between two individuals in a confidential relationship. (Examples:
Securing Information in the Higher Education Office.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
SMALL BUSINESS RESOURCE GUIDE CHECKLIST FOR GOING INTO BUSINESS.
Paula Peyrani, MD Medical/Project Director, HIV Program at the 550 Clinic Assistant Director, Research Design and Development Clinical and Translational.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
HIPAA COMPLIANCE PROTECT INFORMATION INCREASE RECYCLING SAVE MONEY.
STANDARD 5.3 Objective 3 Students will explain and understand the need for confidentiality.
Student Confidentiality: The FERPA/HIPAA Facts AISD Policy Student Records AISD Procedure AP. 11.
Florida Information Protection Act of 2014 (FIPA).
WORKING WITH SPO AND IAO Lynne HollyerNoam Pines Associate Director Research Administrator Industry Alliances OfficeSponsored Projects Office
© Copyright 2011, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers. ® CISO Executive Network Executive Breakfast.
FERPA Refresher Training Start. Page 2 of 11 Copyright © 2006 Arizona Board of Regents FERPA Refresher Training What is FERPA FERPA stands for Family.
Intellectual Property and Senior Design Projects.
Research Services Research Services Presentation to Department of Paediatrics Gill Rowe Head, Research Services, Medical Sciences 23 September 2015.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
HIPAA BASIC TRAINING MODULE 1C – Overview (For staff who do not generally create Protected Health Information) Anderson Health Information Systems, Inc.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Data Breach: How to Get Your Campus on the Front Page of the Chronicle?
HIPAA Health Insurance Portability and Accountability Act of 1996.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES 1 The Technical Services Stuff in IT Services A brief tour of the technical and service offering plethora.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Personnel Overview  Primary project management & development team located in Hong Kong  Deep talent in computational linguistics  Sponsor, supporting.
Chapter 4: Laws, Regulations, and Compliance
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
What is HIPAA? Health Insurance Portability and Accountability Act of HIPAA is a major law primarily concentrating on the prolongation of health.
Wisconsin Department of Health Services Purchase of Services Contract Guide Julie Anstett and Lucinda Champion Friday, May 6, 2016 Wisconsin Department.
Process-based Metadata From a DIA Presentation: eTMF – Migrating from Paper Trial Master Files to Electronic Eldin Rammell, Managing Director, Rammell.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
INDEMNITY The University of Texas System Office of General Counsel Dana Hollingsworth, Attorney.
The CDA Information Security Office Presents…
Protecting PHI & PII 12/30/2017 6:45 AM
HIPAA PRIVACY & SECURITY TRAINING
Confidentiality.
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
Regulatory Compliance
Florida Information Protection Act of 2014 (FIPA)
Responding to a Data Breach 360° of IT Compliance
The CDA Information Security Office Presents…
Florida Information Protection Act of 2014 (FIPA)
FERPA HEA Privacy Act: Protecting Students Data
IS4550 Security Policies and Implementation Unit 5 User Policies
Health Care: Privacy in a Digital Age
Security Awareness Training
Confidentiality Agreement
Lesson 1: Introduction to HIPAA
Personnel Training for Privacy
Colorado “Protections For Consumer Data Privacy” Law
School of Medicine Orientation Information Security Training
Presentation transcript:

Office of Information Security Information & Technology Services Office of Information Security Srini Uppugonduri Associate Director of Information Security Third Party Data – Contractual Agreements and Data Restrictions

UNCC Office of Information Security Agenda Restricted Data Use on Campus Policy Available resources Q & A 11/27/2018 UNCC Office of Information Security

UNCC Office of Information Security Restricted Data Provided by “Third Party” Vendors, Contractors, Sponsors … Confidential, Protected, Restricted Protected by law / policy / agreement Higher level of Security Protections At rest, In transit 11/27/2018 UNCC Office of Information Security

UNCC Office of Information Security Examples Name, Social Security Numbers, Drivers License, State/Federal ID, Financial Account Numbers, Card Numbers, Security Codes Medical Information, Insurance Information, Health care records, Engineering data, designs, blue prints, intellectual property Third party defined Confidential, Protected or Restricted Data 11/27/2018 UNCC Office of Information Security

UNCC Office of Information Security Campus Use Primarily Research Electronic Physical Copies Equipment Personnel 11/27/2018 UNCC Office of Information Security

UNCC Office of Information Security UNCC Policy https://legal.uncc.edu/policies/up-311.9 11/27/2018 UNCC Office of Information Security

UNCC Office of Information Security Available Resources Data Security Officer Dr. Jack Stein Assistant Dean and Director of Engineering Computing ITS Information Security Policy Templates – Data Security Plan Third party agreements 11/27/2018 UNCC Office of Information Security

UNCC Office of Information Security Questions? Thank you! 11/27/2018 UNCC Office of Information Security