1 FTC SAFEGUARDS RULE Gramm-Leach-Bliley Act Effective 5/23/2003.

Slides:



Advertisements
Similar presentations
TIPS FOR MANAGING YOUR INFORMATION:
Advertisements

Family Educational Rights and Privacy Act What you should know about FERPA.
University of Minnesota
Protect Our Students Protect Ourselves
FERPA: Family Educational Rights and Privacy Act
HIPAA Health Insurance Portability and Accountability Act of 1996
FERPA: UPDATE ON THE FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Presented by Brenda V. S. Selman University Registrar-MU University of Missouri-Columbia.
Welcome to the SPH Information Security Learning Module.
Compliance with Federal Trade Commission’s “Red Flag Rule”
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Is It Legal? Is It Fair? What Is and Is Not Enforceable in the College Classroom.
Identity Theft Prevention Program Red Flags Rules Fighting Fraud at Montana Tech.
Privacy and Information Security Training ( ) VUMC Privacy Website
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
HIPAA How can you maintain patient privacy and confidentiality? General Medicine LCCA.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
Gramm-Leach-Bliley Act for Financial Aid Val Meyers Associate Director Michigan State University.
1 SAFEGUARDING REGULATIONS AND HOW THEY EFFECT US MICHIGAN ASSOCIATION FOR STUDENT FINANACIAL SERVICE ADMINISTRATORS BY: KAREN REDDICK NATIONAL CREDIT.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
Identity Theft Solutions. ©SHRM Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the.
Protecting the Confidentiality of Social Security Numbers Business Procedures Memorandum 66 Revised November 1, 2006 The University of Texas System.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Complying with Privacy to Enable Innovation & Research
FERPA: Family Educational Rights and Privacy Act.
1 GRAND VALLEY STATE UNIVERSITY FAMILY EDUCATIONAL RIGHTS & PRIVACY ACT (FERPA) TRAINING OFFICES OF THE REGISTRAR AND UNIVERSITY COUNSEL JANUARY 20, 2009.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
FERPA Family Educational Rights and Privacy Act or Buckley Amendment.
What You Need to Know Customer Service 1 08/09/2012.
10 Essential Security Measures PA Turnpike Commission.
DEED WorkForce Center Reception and Resource Area Certification Program Module 2 Unit 1b: WorkForce Center System II Learning Objectives III.
HIPAA Privacy & Security EVMS Health Services 2004 Training.
2005 MASFAA CONFERENCE CHARLESTON, WEST VIRGINIA Ginny D’Angelo Vice President of Student Loans Commerce Bank Diane Lambart Fleming Associate Director.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Next ETCH Confidentiality and HIPAA Annual Review What you need to know. The Privacy Rule 1.
IVCC Information Security Plan Important information about the privacy of student records Adapted from SVCC Information Security Plan, 3/03. IVCC Revision.
Privacy and Information Management ICT Guidelines.
MAINTAINING PRIVACY & DATA SECURITY IN THE VIRTUAL PRACTICE OF LAW.
FERPA Family Educational Rights and Privacy Act A Tutorial.
Information Security Office Protecting Privacy in the New Millennium © Copyright Melissa Guenther, LLC. All rights reserved. Kelley Bogart – Information.
0 Managing Student Records Legally and Effectively Tiffany Hogue Provost’s Office Spring 2009.
1 st Choice Document Destruction th Avenue, Milaca, Minnesota Office: Cell:
When you request technical support Please remember to request it by ing or calling , Even if you .
® HHM Clean Desk Policy. 2 ® Clean Desk Policy : What Will You Learn Importance of Privacy and Security The kinds of information we protect Privacy Requirements.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Taylor County Schools FERPA (Confidentiality) Training August 17, 2010.
Protection of Minors Program Coordinators Information Session November 2015 Carolyn Brownawell Melisa Giraldo Dietrich Warner.
Protect Our Students Protect Ourselves
Protecting PHI & PII 12/30/2017 6:45 AM
Protection of CONSUMER information
Chapter 3: IRS and FTC Data Security Rules
Red Flags Rule An Introduction County College of Morris
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Welcome to the SPH Information Security Learning Module
FERPA for Colleges & Universities
Managing Student Records Legally and Effectively
UCA Gramm-Leach Bliley Act (GLBA) Safeguards Rule Compliance Training Effective June 12, 2018 Adapted from materials published by the Federal Trade Commission.
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
The Health Insurance Portability and Accountability Act
Presented by Elizabeth Kunkel Member Service Trainer
HIPAA Do’s and Don'ts: What is Really Behind Protected Health Information (PHI) and Health Care Privacy Rules Paul Sisler, Director, Information Services;
The family educational rights and privacy act of 1974
Family Educational Rights and Privacy Act of 1974
Presentation transcript:

1 FTC SAFEGUARDS RULE Gramm-Leach-Bliley Act Effective 5/23/2003

2 Introduction The purpose of the FTC Safeguards Rule is to: Ensure the security and confidentiality of customer information. Customer information is defined as any record containing nonpublic personal information such as a social security number, whether in paper, electronic, or other form, that is handled or maintained by or on behalf of VCU or its affiliates. Protect against any anticipated threats or hazards to the security or integrity of such records. Protect against unauthorized access to or use of such records or information that could result in substantial harm or inconvenience to any customer. This Rule is governed by the Federal Trade Commission and is required by the Gramm-Leach-Bliley Act that was signed into law by President Clinton on November 12, Go to for more information on the Gramm-Leach-Bliley Act.

3 Standards for Safeguarding Customer Information The goal of Virginia Commonwealth University is to eliminate unacceptable risks in order to safeguard customer information and protect the confidentiality and privacy rights of its customers.

4 Protected Customer Information The privacy rule limits the use and disclosure of customer information. View the Family Educational Rights and Privacy Act (FERPA) at this website: Use refers to what is done with the protected information, such as nonpublic information, within VCU. Disclosure refers to what is given out to an external entity for use outside of VCU. Covered Entities: Non directory information such as social security number, grades, schedules, GPAs, bank account numbers, ID numbers, and academic standing.

5 Practical Tips for Safeguarding Customer Information Do not leave confidential data unattended or visible by others. Shred and never recycle documents containing confidential customer information such as a social security number. Secure all daily work in locked file cabinets or drawers Protect secured areas – lock all doors, and never loan your key. Talk quietly when discussing confidential or private information with a customer. Avoid the use of names or other identifying information whenever possible. Sensitive information should not be sent to remote printers or photocopiers where access is uncontrolled. Nor should it be faxed where the physical security of the receiver is unknown. Include a confidential statement on your fax transmittal sheet that information sent to the incorrect destination be destroyed, and requesting notification to the sender of such errors. Do not dispose of documents containing nonpublic information in wastebaskets, or recycling bins; instead, shred or otherwise destroy before discarding. Sensitive information should never be left on voic , or answering machines. Avoid using nonpublic information via . Use password-activated screensavers.

6 What This Means VCU should safeguard customers information by adhering to the following policies and guidelines: Federal Educational Rights and Privacy Act (FERPA) State and University policies on Records Retention and Disposition University Information Technology Policies and Guidelines - VCU Financial Policies State of Virginia Information Technology Policies and Guidelines Payroll Services Guidelines and Polices -

7 Comments/Questions Please forward any comments or questions to the Safeguard Coordinator, Anjour B. Harris, at or P.O. Box