© 2012 Boise State University1 Click for Next Slide! Information Security for Faculty and Researchers Created By OIT Information Security Services

Slides:



Advertisements
Similar presentations
© 2012 Boise State University1 Click for Next Slide! Information Security on the Front Lines Created By OIT Information Security Services
Advertisements

© 2012 Boise State University1 Information Security for Your Office Created By OIT Information Security Services
Department of Information Systems Brigham and Womens Hospital Laptop Encryption Catherine McGoldrick Schroeder Corp. Mgr, BWH IS Management & Planning.
Financial Services Workshop Margaret Umphrey ECU Information Security Officer March 12, IT Security, East Carolina University.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Best PracticesUSCA Fall 2010: Baylor University3.
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Rob Walker, May 2008Student Learning Unit Victoria University1 Essay Writing A workshop for ASW 3102: Critical Social Work Theories.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
The Family Educational Rights and Privacy Act
Gaucho Round-Up FAQ’s This presentation covers some of the FAQ’s about campus clean-up day. Presentation #4 2/3/
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
Springfield Technical Community College Security Awareness Training.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Information Privacy and Compliance Training For All Brigham Young University– Idaho Employees.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
KDE Employee Training. What IS a Data Breach? Unauthorized release (loss or theft) of Sensitive or Confidential Data, such as PII, PHI, etc. On site or.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Locking the Backdoor: Computer Security and Medical Office Practice Dr. Maury Pinsk, FRCPC University of Alberta Division of Pediatric Nephrology.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
New Faculty Orientation to Privacy and Security at UF Susan Blair, Chief Privacy Officer Kathy Bergsma, Information Security.
Information & Communication Technologies NMSU All About Discovery! Risk-Based Information Security Program at NMSU presented by Norma Grijalva.
IT Security Essentials Ian Lazerwitz, Information Security Officer.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
DEED WorkForce Center Reception and Resource Area Certification Program Module 2 Unit 1b: WorkForce Center System II Learning Objectives III.
Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
New Data Regulation Law 201 CMR TJX Video.
Desktop 1 Owning the Desktop: Is.edu like.com? Scott Bradner Harvard University University Technology Security Officer 28 June 2006.
Protecting Sensitive Information PA Turnpike Commission.
Securing Information in the Higher Education Office.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Electronic Records Management: What Management Needs to Know May 2009.
ESCCO Data Security Training David Dixon September 2014.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Privacy and Information Management ICT Guidelines.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
University Health Care Computer Systems Fellows, Residents, & Interns.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Information Security Office Protecting Privacy in the New Millennium © Copyright Melissa Guenther, LLC. All rights reserved. Kelley Bogart – Information.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Data Breach: How to Get Your Campus on the Front Page of the Chronicle?
Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.
IT Security Challenges In Higher Education Steve Schuster Cornell University Copyright Steve Schuster This work is the intellectual property of.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Personal Data Protection and Security Measures Kelvin Lai IT Services - Information Security Team 12 & 13 April 2016.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Information Security Training 101
Protecting PHI & PII 12/30/2017 6:45 AM
E&O Risk Management: Meeting the Challenge of Change
Regulatory Compliance
Move this to online module slides 11-56
Move this to online module slides 11-56
School of Medicine Orientation Information Security Training
Presentation transcript:

© 2012 Boise State University1 Click for Next Slide! Information Security for Faculty and Researchers Created By OIT Information Security Services

© 2012 Boise State University2 Click for Next Slide! Information Security for Faculty & Researchers Role of Information Security Office State and Federal Law Boise State Policy Definitions: Personal Data Institutional Data Public Data Intellectual Property Research Data Copyrighted Materials Confidential Information Best Practices for Protecting Information

© 2012 Boise State University3 Click for Next Slide! State and Federal Law Alphabet Soup... FERPA HIPAA PCI-DSS GLBA SOX Red Flag Alerts DMCA Idaho Code § §28-51-

© 2012 Boise State University4 Click for Next Slide!... And Boise State Policy Information Technology Resource Use (8000) Information Privacy and Security (8060) University Records and Archives (1020) Non Discrimination and Anti-Harassment (1060)

© 2012 Boise State University5 Click for Next Slide! Personal Data Your own sensitive information stored on MyBoisestate, Broncomail or in your office Name Address Social Security Number Banking Information Insurance Information Family Information

© 2012 Boise State University6 Click for Next Slide! Institutional Data Any data that is subject to state or federal regulation, data that is required to be protected by contractual obligation, as well as all data created, collected, maintained, recorded or managed by the university, its staff, and agents working on its behalf. It includes data used for planning, managing, operating, controlling, or auditing university functions; especially data used by multiple university units; and data used for university reporting. University data also includes research data that contains personally-identifiable subject information, or proprietary university information and trade secrets From: Boise State Data Classification StandardBoise State Data Classification Standard

© 2012 Boise State University7 Click for Next Slide! Public Data Information that is available through open records requests While public information is generally available for viewing by the public, certain rules and conventions apply about how and when the information may be viewed.

© 2012 Boise State University8 Click for Next Slide! Intellectual Property Information developed through non-sponsored research: May be stored in computers, on media, in printed form, etc. May be copyrightable May generate income May be subject to laws and/or policies Intellectual Property Policy (1090)

© 2012 Boise State University9 Click for Next Slide! Research Data Information developed through sponsored research: All the characteristics of non-sponsored research, plus... May be subject to contractual obligations

© 2012 Boise State University10 Click for Next Slide! Copyrighted Materials Applies to printed material as well as audio, video, images and other media Copying or duplicating without permission may have serious legal and/or financial consequences Be aware of peer-to-peer file sharing enabled on your computer

© 2012 Boise State University11 Click for Next Slide! Confidential Data Students, Faculty, Staff, Donors, Contractors Financial Records Grades Credit Card Information Health Care Information Addresses Phone Numbers Insurance Records Social Security Numbers Protected By Law!

© 2012 Boise State University12 Click for Next Slide! Best Practices More Alphabet Soup PII P ersonally I dentifiable I nformation This is the Key Acronym!

© 2012 Boise State University13 Click for Next Slide! Best Practices Safeguard The Information on Your Computer And In Your Office Your Personal Information Student Information Your Research

© 2012 Boise State University14 Click for Next Slide! Best Practices How Can Data be Lost? Laptop or other data storage system stolen from car, lab, or office. Research Assistant accesses system after leaving research project because passwords aren't changed. Unauthorized visitor walks into unlocked lab or office and steals equipment or accesses unsecured computer. Unsecured application on a networked computer is hacked and data stolen.

© 2012 Boise State University15 Click for Next Slide! Best Practices What is the result of lost data? Loss of personal use of a computer Loss of funding Fines Bad Publicity Expose students, staff, contractors, donors to identity theft

© 2012 Boise State University16 Click for Next Slide! Best Practices Protecting Information If you print itgo get it right away Lock up sensitive informationincluding laptops Store sensitive information on file servers Consider whether you really need to store it Shred it if you can Data Retention Standards

© 2012 Boise State University17 Click for Next Slide! Best Practices Protecting Information Use strong passwords Change passwords often Use different passwords on different systems Never share your password Password protect your screensaver Manually lock your screen whenever you leave your desk

© 2012 Boise State University18 Click for Next Slide! Best Practices Protecting Information Be sure your computers operating system and anti-virus software are up-to-date Never open unsolicited from an unknown source or click on unfamiliar web addresses Follow computer salvage proceduresfor disks, too!

© 2012 Boise State University19 Click for Next Slide! Universities in the News! University of Idaho 70,000 Donor Records University of Texas at Austin 225,000 Student Records UCLA 500,000 Student Records

© 2012 Boise State University20 Click for Next Slide! Idaho in the Cybersecurity News But not in a good way! August Idaho Army National Guard A small computer drive containing Social Security numbers and other personal information about every Army National Guard soldier in Idaho has been stolen. 3,400 records Mar. 10, 2007 University of Idaho A data file posted to the school's Web site contained personal information including names, birthdates and Social Security numbers of University employees. 2,700 records Dec. 7, 2005 Idaho State University, Office of Institutional Research ISU discovered a security breach in a server containing archival information about students, faculty, and staff, including names, SSNs, birthdates, and grades. Unknown number of records

© 2012 Boise State University21 Click for Next Slide! University NOT in the News! Boise State University Zero Lost Records So Far! Go Broncos!

© 2012 Boise State University22 Click for Next Slide! What To Do! Know who to call! I think my computer is infected, what do I do? Call the Help Desk I think I lost the USB drive I used to take some sensitive files home to work on, what do I do? Call the Information Security Office

© 2012 Boise State University23 Click for Next Slide! Information Security for Faculty & Researchers Information Security Services Website With links to laws and recommendations for protecting information