What You MUST Do Be aware of what constitutes Personally Identifiable Information (PII) Protect this information and passwords that.

Slides:



Advertisements
Similar presentations
Protect Our Students Protect Ourselves
Advertisements

ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Maintaining Security While Using Computers What all of Our Computer Users Need to Know.
Springfield Technical Community College Security Awareness Training.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Strengthening Password Policy via Outlook Features Password Policy and How-To Guide Richard Steiner December 16, 2003
Peirsonpatterson,llp eDisclosure Solution ppdocs.com.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
[INSERT COMPANY NAME] Protecting Against Data Breach YOU ARE THE FIRST LINE OF DEFENSE Copyright 2010 Jackson Lewis LLP This sample training powerpoint.
Data Access and Data Sharing KDE Employee Training Data Security Video Series 2 of 3 October 2014.
Practical Information Management
On-line Evaluation Process Training for New Certificated Employees.
HQ Expectations of DOE Site IRBs Reporting Unanticipated Problems and Review/Approval of Projects that Use Personally Identifiable Information Libby White.
Best Practices for Protecting Data. Section Overview Mobile Computing Devices Technical Procedures Data Access and Permissions Verbal Communication Paper.
Your Computer Media Player VancoVision Server Content  Create content files and a schedule.  Send files to server  Media Player (remote location) will.
©Holm Publications Security Awareness Presentation.
EJYH Web Site Coaches/ Managers Training. Log In   User Name =  Password was ed to you when you registered- you can.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Computer stuff LIBS100.
General Awareness Training Security Awareness Module 3 Take Action! Where To Go for Help.
Using Internet Explorer go to driversalert.com Employees who operate vehicles on department business should use the following instructions to access and.
Overview Of The System Hero will be routed to the Affiliate next in queue by providing zip code or city/ state. Hero has the option to chose an Affiliate.
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Internet Hardware Computer Literate.
CCS Temporary Physician Paneling Process. Temporary Physician Paneling Effective immediately the CMS Branch has changed the name of Emergency paneling.
Sharing Google Docs. Open Google Chrome Open your dashboard.
NO MORE FLASH DRIVES How to get your stuff printed at school.
 The overall objective is for the student to establish and begin using a secondary account utilizing Gmail’s web based system COURSE OBJECTIVES.
Using Internet Explorer go to driversalert.com Employees who operate vehicles on department business should use the following instructions to access and.
Peirsonpatterson,llp eDisclosure Solution ppdocs.com.
Government Agency’s Name April Identity Theft is when someone steals your personal information and uses it as their own, usually for some financial.
Contract System Online Employee Signatures Human Resources my.brocku.ca.
Information Management and the Departing Employee.
BCSD Computer Resources for Students Information You Can Use.
Presented by Peter Oldreive ICT Consultant in English Language Art, Social Studies, Fine Arts Eric Therrien ICT Consultant in Mathematics & Sciences Getting.
| gtb.scotiabank.com Global Transaction Banking & Scotiabank Mount Allison University Global Transaction Banking Global Transaction Banking | pg.
Effect of Corporate IT Policies on Otherwise Privileged Communication By: Jonathan T. Barton.
Safe Computing Protect your electronic profile means protecting You and Case Information Security Office, ITS Case Western Reserve University 2015 Information.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Information Security Awareness Training
BCSD Computer Resources for Students
Protect Our Students Protect Ourselves
Protecting PHI & PII 12/30/2017 6:45 AM
Google Drive.
Transforming PowerPoints with Google Docs
Protecting Client Confidentiality for Volunteers and Agency Staff
LMS: Contractor Sign In
BCSD Computer Resources for Students
Student Engagement with Interactive Polling
Technology Center Norms
Things To Avoid: 1-Never your password to anyone.
File Stream and Team Drives
COM Orientation The template can be used to create presentations for community, civic, advocacy and government relations groups. It is also appropriate.
Backing Up Files File Maintenance Unit.
Sexual Harassment in the Workplace
People Admin Annual Performance Review Supervisor Guide
Subject Access Request Online Form
“Pay for Print” Quick Start Guide
How to use Office 365 for Students.
Outlook 2013.
Getting Started with Google Applications
Steppa Cyber Security Training Tips Your Business Was Seeking For With Cyber Security Training!
Managing data breaches
HQ Expectations of DOE Site IRBs
Employee Cybersecurity Program
LMS: Contractor Sign In
What You MUST Do Be aware of what constitutes Personally Identifiable Information (PII) Protect this information and passwords that.
Mobile Registration App Training Guide for OPO Staffers
Protecting Student Data
Presentation transcript:

What You MUST Do Be aware of what constitutes Personally Identifiable Information (PII) Protect this information and passwords that allow access Only allow rights to information on a “need to know” basis Seek Non-Disclosure agreements with vendors/app developers where student data may be needed or stored in order to utilize their service (*Please contact Melissa Shepard when in need of utilizing this disclosure agreement.) Be aware of information placed in cloud services (uploaded and stored over the Internet) Ensure that permissions (who can see your documents, etc.) are set appropriately in your cloud storage (One Drive, Google Drive, etc.) Be aware of information stored on flash drives, hard drives, computers, etc. Be aware of sending, forwarding or replying to emails that may contain PII or that may be phishing for information Log out of computers/programs having access to PII If you feel a breach has occurred, notify your administrator immediately!

Training Acknowledgement Form Personal Information (P.I.) and Data Breach Awareness Harrison County Schools 2018-2019 School Year I have watched the PowerPoint entitled “A Kentucky Educator’s Guide to TOP SECRET Personal Information and Data Breach Awareness”. _____________________________________ Employee Name (please print) Signature of Employee __________________ Date