Information Sensitivity

Slides:



Advertisements
Similar presentations
Family Educational Rights and Privacy Act (FERPA) Basics For Faculty and Staff.
Advertisements

Compliance storyboard: Classifying & controlling content at the input device.
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
Indicator 3.02 Use communication skills to foster open, honest communications.
Code of Ethics for Professional Accountants
Position Opening Job Classification: Administrative Assistant, Sales Opening Date: December 12, 2013 Location: Corporate Office - Chaparral Closing Date:
Drafting and Reviewing Confidentiality Agreements West LegalEdcenter 2012.
Confidentiality and HIPAA
Management Control Systems
McCarthy Tétrault McCarthy Tétrault LLP An Act respecting the protection of personal information in the private sector (Quebec): « Particularities of the.
Ethics To do the “right thing” you need to know what the “right thing” is.
Information Security Policies: User/Employee use policies.
Residential Lending Property of Citigroup:Internal Document 0 Project Blacksmith Portal Server Investigation Prepared by: Technical Architecture & Strategy.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
INTERNET and CODE OF CONDUCT
Ethics in Finance PGDM-Session 7.
LEGAL ASPECTS OF GLOBAL BUSINESS: PROTECTING YOUR BUSINESS INTERESTS Tyler T. Ray, Esq. Duffy & Sweeney, LTD
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Security and Privacy Strategic Global Partners, LLC.
Training Module 11 – Version 1.1 For Internal Use Only Communication Policy ® Corporate Communications, Disclosure and Insider Trading Policy 
E-COMMERCE AND PRIVACY LAWS IN THE UAE Rindala Beydoun Senior Legal Counsel Al Tamimi & Company.
Family Educational Rights and Privacy Act. From the moment a child enters the school system, sensitive information is collected about the child (and even.
ALEX STEWART INTERNATIONAL’S CODE OF PROFESSIONAL CONDUCT.
Ethics in Finance.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
TRADE SECRETS Presented By Joseph A. Calvaruso Orrick, Herrington & Sutcliffe LLP 1 © AIPLA 2012.
Mandatory online training. intro why we are doing this why you should care what we hope you get out of this.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Safe’n’Sec IT security solutions for enterprises of any size.
INDICATOR 3.02 USE COMMUNICATION SKILLS TO FOSTER OPEN, HONEST COMMUNICATIONS.
Information system in tourism. Tourism industry The World Tourism Organization defines tourists as people "traveling to and staying in places outside.
Dial-in Access Policy By Matt Lynott. Reasoning The reason for this policy is to define appropriate dial-in access and its use by authorized personnel.
Classification September 2003© Peltier and Associates, all rights reserved Creating an Asset Classification Methodology ISIG & ISSA September, 2003.
Presented by Chris Backo
Declaration of Affiliation: Understanding Your Disclosure Obligations
EPE INTERNAL CODE OF CONDUCT
Mysale Information Classification 101
Protection of CONSUMER information
Office of Information Technology October 18, 2016
Operations Management
Lecture 09 Network Security Management through the ISMS
Privileged Information: Confidentiality and Disclosure
Astrachan Gunst Thomas, P.C.
Service Organization Control (SOC)
FERPA Family Educational Rights and Privacy Act of 1974
What is FERPA? Family Educational Rights and Privacy Act (FERPA) “is a federal law that protects the privacy of student education records. The law applies.
PERSONAL DATA PROTECTION ACT 2010
Pre-Close Rules of Engagement
Cyber Issues Facing Medical Practice Managers
Threat Landscape for Data Security
Business Ethics Ethics are rules of behavior based on a group’s ideas about what is right and wrong Business ethics are principles that help define appropriate.
A+ A+ CORPORATION PRESENTS: INFORMATION TECHNOLOGY DEPARTMENT
CompTIA Security+ Study Guide (SY0-401)
European Operations Company Confidential.
Mysale Information Classification 101
Confidentiality of Information Acknowledgment and Agreement 2018
SSHHHH! It’s a Trade Secret
Privacy Policy the Law….
Premier Employee Program Version 4.0
Indicator 3.02 Use communication skills to foster open, honest communications.
Protecting Trade Secrets in the US
Engineering Ethics Training Session
Colorado “Protections For Consumer Data Privacy” Law
Jadu XForms Professional
ETHICS FOR IT WORKERS AND IT USERS 1 Rifat al mamun Roll : Presented by.
The Health Insurance Portability and Accountability Act
Presentation transcript:

Information Sensitivity By Michael Huber

Overview Purpose Classifications Policy Degrees of Sensitivity Enforcement

Purpose Helps employees determine which information is sensitive Gives employees a relative sensitivity of information that should not be disclosed outside of the office

Classifications Public Confidential “Third Party” Confidential

Public Information Declared public knowledge Can freely be given to anyone without any threat of damage to the company

Confidential Information All other information A continuum Critical: Trade secrets, developmental programs, potential acquisition targets etc. Less Critical: Telephone directories, personnel information

“Third Party Confidential” Information Information from other companies Ex. vendor lists, customer orders, supplier information etc.

Policy Minimal Sensitivity - General corporate information; some personnel and technical information Access Distribution within company Distribution outside Internal mail Electronic Distribution Storage Disposal Penalty for disclosure

Policy(cont.) More Sensitivity - Business, financial, technical, and most personnel information Access Distribution within company Distribution outside Internal mail Electronic Distribution Storage Disposal Penalty for disclosure

Policy(cont.) Most Sensitive - Trade secrets & marketing, operational, personnel, financial, source code, & technical information integral to the success of our company Access Distribution within company Distribution outside Internal mail Electronic Distribution Storage Disposal Penalty for disclosure

Enforcement Violation of this policy may result in disciplinary action, up to and including termination of employment.

Questions??