Evolution of Data Use and Stewardship Recent University-wide Data Stewardship Enhancements Integrated System Data Stewardship Shirley C. Payne, CISSP,

Slides:



Advertisements
Similar presentations
Introduction to Records Management Policy
Advertisements

Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
What is GARP®? GARP® is an Acronym for Generally Accepted Recordkeeping Principles ARMA understands that records must be.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
NAU HIPAA Awareness Training
SL21 Information Security Board Mission, Goals and Guiding Principles.
SIU School of Medicine Identity Protection Act and Associated SIU Policy.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Data Ownership Responsibilities & Procedures
Summer IAVA1 NATIONAL INFORMATION ASSURANCE TRAINING STANDARD FOR SYSTEM ADMINISTRATORS (SA) Minimum.
Use of Working Titles Broad unit authority with periodic central HR/unit review Used in directories, verification of work and business cards Working Title.
Supportive Services for Veteran Families (SSVF) Data Bigger Picture Updated 5/22/14.
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
Developing a Records & Information Retention & Disposition Program:
Data Management Awareness January 23, University of Michigan Administrative Information Services Data Management Awareness Unit Liaisons January.
Internal Control Concepts A Guide for Deans, Directors, and Department Chairs.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Achieving our mission Presented to Line Staff. INTERNAL CONTROLS What are they?
Session 3 – Information Security Policies
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
Control environment and control activities. Day II Session III and IV.
Peer Information Security Policies: A Sampling Summer 2015.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Mandatory Annual ACE Training Fiscal Year 2011 – 2012.
Agenda 1. Definition and Purpose of Data Governance
An Educational Computer Based Training Program CBTCBT.
Conservation Districts in New York Training Module 1.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Mandatory Annual ACE Training Fiscal Year 2010 – 2011.
1 Records Inventory & Data Classification Workshop Data Classification Project Note: This is an example of one agency’s approach to meeting the state records.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Agency Risk Management & Internal Control Standards (ARMICS)
- The Basics - Training Module 1. What You’ll Learn In This Module What is a Conservation District? What is it suppose to do? Who are the people involved.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
TAMUCC EPA SECURITY Security Training for Users of Canopy for Creation and Approval of Payroll Documents.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
DATA IT Senate Data Governance Membership IT Senate Data Governance Committee Membership Annie Burgad, Senior Programmer, Central IT Julie Cannon, Director.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Grant Administration Agreement Which governs the relationship between NSFAS & Institutions.
Information Resource Stewardship A suggested approach for managing the critical information assets of the organization.
WESTERN PA CHAPTER OF THE AMERICAN PAYROLL ASSOCIATION – NOVEMBER 4, 2015 Risk Management for Payroll.
TASFAA 2016 Legacy of Leadership. TASFAA 2016 Legacy of Leadership Family Educational Rights and Privacy Act (FERPA) An Overview Molly Thompson Associate.
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Responsible Data Use: Data restrictions Robert R. Downs, PhD Center for International Earth Science Information Network (CIESIN), Columbia University Version.
IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Banner Data Correction Training Employee Data Correction Process.
Privacy principles Individual written policies
IS4680 Security Auditing for Compliance
Working Title Guidelines
IT Development Initiative: Status and Next Steps
Red Flags Rule An Introduction County College of Morris
Securing Your Web Application and Database
The General Data Protection Regulation: Are You Ready?
IS4680 Security Auditing for Compliance
Human Resources and Corporate Services
Presentation transcript:

Evolution of Data Use and Stewardship Recent University-wide Data Stewardship Enhancements Integrated System Data Stewardship Shirley C. Payne, CISSP, CRISC UVa Assistant VP for Information Security, Policy, and Records July, 2012

etc. Data Dark Ages Centralized Stovepipe Data Stores

etc. Data Floodgates Opened In Early 90s I NFORMATION W AREHOUSE

Clarified data ownership: University is owner of all administrative data Organizational units may have stewardship responsibilities for portions of those data Set high level conditions of data use: Use only for University business Comply with confidentiality and privacy policies and laws Comply with reasonable protection and control procedures Present data accurately

Defined roles and responsibilities for (initially) : Data Stewards – data use planning/policy Data Custodians – data creators/updaters Data Users – data viewers ITC – technical underpinning New roles and responsibilities added over time and existing ones renamed and/or updated Last update was in 2001

Departmental Systems ERPs Escalating Security Threats Web Apps New Laws & Regulations Increasing Public Awareness & Concern Cloud Computing Mobile Computing

Highly sensitive data requested only when essential Highly sensitive data provided only when essential Highly sensitive data access authorized to least # of people Highly sensitive data stored only in well secured devices and file cabinets University Processes & Supporting Systems Data Minimization Initiative Clear data use policies and standards exist Responsibilities for data protection well communicated Compliance verification processes in place

Redefined Data Classifications

Highly Sensitive Moderately Sensitive Not Sensitive - Data that enables identity theft - Personally- identifiable medical data Everything In between Public Data such as: - University financial statements - Summary statistics, e.g. employees by gender

Redefined Data Classifications Protection and Use of SSNs Policy

Redefined Data Classifications Protection and Use of SSNs Policy Electronic Storage of Highly Sensitive Data Policy

Redefined Data Classifications Protection and Use of SSNs Policy Electronic Storage of Highly Sensitive Data Policy Institutional Data Protection Standards By Classification

Redefined Data Classifications Protection and Use of SSNs Policy Electronic Storage of Highly Sensitive Data Policy Institutional Data Protection Standards By Classification Revision of Administrative Data Access Policy

Current Policy Planned Revision Administrative Data Access Policy Addresses administrative electronic data shared across departments Roles and responsibilities do not reflect current practice; unclear how to fulfill Institutional Data Stewardship Policy Addresses all data owned by the institution wherever they are created and used and whatever the form Roles and responsibilities are updated and clearer Clear linkage made between data classifications and data protection standards

Data Domain Roles System-Specific Roles

Human Resources Data Procurement Data Payroll Data Accounts Receivables Data Development Data Student Records Data Other Data Domains

Human Resources Data Domain Integrated System Time and Leave System System Other Systems Benefits System

Integrated System Procurement Data Domain Accounts Receivables Data Domain Hunan Resources Data Domain Payroll Data Domain Other Data Domains Budget Data Domain

Senior university officials having planning and policy-level responsibilities for a large subset of the institutions data resource. They: Oversee the implementation of the Institutional Data Stewardship Policy for their data domains Determine the appropriate classification of institutional data within their domains in consultation with executive management and appropriate others Appoint Data Stewards for their data domains

University officials having responsibility for determining purposes and functions of data within their assigned data domains. They: Work to ensure accuracy, integrity, and (as appropriate) confidentiality of data Establish criteria for meeting the need to know requirement for data access. Have final sign-off authority for users seeking to access data for their respective data domains. May delegate final sign-off authority to Deputy Data Stewards they appoint, but retain accountability for results. Work to ensure users understand the data to which they have access

Authorize or reject access requests based upon approval criteria established by the Data Stewards who appoint them

Data Users – acknowledge acceptance that they are accountable for protecting and appropriately using data to which they are given access meet all prerequisite requirements, e.g. attend training on system use, before being granted approved access. Supervisors – confirm that their employees job duties require system access privileges assure system access privileges are removed when employees no longer need them. Data Access Approvers – develop in-depth understanding of various responsibilities established within a given system confirm that data access requests for a given system are completed correctly, e.g. that appropriate system responsibilities are selected for the stated purpose(s). Provisioners – central IT staff who implement the requested access authorizations.

Protection & Use of SSNs Policy Electronic Storage of Highly Sensitive Data Policy Institutional Data Protection Standards Administrative Data Access Policy (under revision) Additional IT Policies