Examples of Personal Data Requiring Protection

Slides:



Advertisements
Similar presentations
Mandatory training for all Users who have access to Privacy Act Data
Advertisements

Mount Auburn Hospital Medical Staff Quarterly March 18, 2010 Bob Todd, Director IT Mount Auburn Hospital Agenda Items: o Focus on Security Tools.
13.5 Collecting Outstanding Patient Accounts
9 x9 81 4/12/2015 Know Your Facts!. 9 x2 18 4/12/2015 Know Your Facts!
1 x0 0 4/15/2015 Know Your Facts!. 9 x1 9 4/15/2015 Know Your Facts!
1 x0 0 4/16/2015 Know Your Facts!. 1 x8 8 4/16/2015 Know Your Facts!
3 x0 0 7/18/2015 Know Your Facts!. 4 x3 12 7/18/2015 Know Your Facts!
Preventing Mail Theft Presented by American Crime Prevention Institute.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
The FAFSA: Making It User Friendly Presented by Campus Planning Inc.
TELEPHONE NUMBER TELEPHONE NUMBER
Aim: What strategies can we use to keep our financial information safe online? Do Now: What do you do to protect your information online?
Chapter 2 Legal Compliance. The Employment Relationship Employer-employee Independent Contractor Temporary Employee.
Human Resources Leslie Lum. Human Resource Goals n Staffing - Planning, recruiting and selecting people to work for the company n Motivation - Designing.
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
PRIVACY SAFEGUARDS ANNUAL TRAINING FY 2011 previous next Office of Management Privacy, Information and Records Management Services Privacy Safeguards Division.
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
HIPAA Business Associates Leadership Group Meeting June 28, 2001.
INFORMATION TECHNOLOGY SERVICES Privacy 101 Information Security and Privacy Office.
Going to a Job Site Being prepared for the application.
Section 6-4 Credit Cards: How to Protect them. Fair Credit Reporting Act Forbids credit agencies from giving up incorrect information.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Real Estate Principles Tenth Edition Real Estate: An Introduction to the Profession Tenth Edition.
South-Western Publishing©2002 By Charles J. Jacobus Real Estate Principles Ninth Edition Real Estate: An Introduction to the Profession Ninth Edition South-Western.
© 2010 by Cengage Learning Chapter 22 ________________ Fair Housing, ADA, Equal Credit, and Community Reinvestment.
FERPA: What you Need to Know The Family Educational Rights and Privacy Act & SEI.
WHAT AM I? What is my name? I am a personality inventory and I measure: Tension Depression Anger Vigor Fatigue Confusion A.Profile of Mood State A. B.
4 x1 4 10/18/2015 Know Your Facts!. 5 x /18/2015 Know Your Facts!
3 x0 0 10/18/2015 Know Your Facts!. 11 x /18/2015 Know Your Facts!
Financial Law Coach Johnson Understanding Business and Personal Law.
Chapter 9 CHECKING ACCOUNTS. Financial institutions (like banks and credit unions) offer a number of services. Can you name a service?
Understanding and Preventing.  Acquiring someone’s identifying information and impersonating them for gain.
Recycling Do’s and Don’ts. Identifiable Information Information that can be used on its own or with other information to identify, contact, or locate.
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
Disability Income Protection from MassMutual. At the Center of Your Financial Security. SM Do you have a comprehensive health insurance plan? An unbalanced.
PATIENT- AND FAMILY-CENTERED CARE: Partnerships for Safety & Quality Staff Physician & Resident Physician Toolkit.
Federal Agencies and Laws for Consumer Rights
CIVIL RIGHTS & ADA West Texas Opportunities, Inc September 27, 2012.
Serving Association Members Across North America.
Chapter 8 Working with People. Diversity ► Refers to the great variety of people and their backgrounds, experiences, opinions, religions, ages, talents.
Family & Medical Leave Act (1993) Social and demographic changes –60% of mothers with children under 6 are in the workforce (18% in 1960) –75% of mothers.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
SOCIAL SECURITY MAXIMIZATION Exclusive rights to this material belongs to GPS. Unauthorized use of this material is prohibited. SOCIAL SECURITY MAXIMIZATION.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
Compare Critical Illness Insurance In UK
Information Security and Privacy Office
Federal Agencies and Laws for Consumer Rights
Your personal mobile phone
YOUR MONEY ABROAD.
Human Resources Functions
معلم الصف الثالث الابتدائي
Least Privilege.
Investing in Your Career
Learn Your 2x Facts.
Protecting Your Identity
What Would You Do? Ethics in Travel and Tourism Management.
ФОНД “СОЦИАЛНО ПОДПОМАГАНЕ”
Introduction to Employment and Employee Relations
Chapter 2: Using Your Helping Skills with Diverse Populations
Protecting Your Credit Identity
Number in the Middle.
Personnel Training for Privacy
№96 сонли умумий ўрта мактабининг ўқитувчиси Эшанкулова феруза
Your personal mobile phone
I have… I have… Who has 3:40? Who has 12:20? I have… I have…
Lawson Employee Self-Service Portal
Presentation transcript:

Examples of Personal Data Requiring Protection Financial, credit and medical data Security clearance level Leave balances; types of leave used Home address & telephone numbers, personal e-mail address Social Security Number Mother’s maiden name; other names used

Examples of Personal Data Requiring Protection Drug test results & fact of participation in rehabilitation program Family data Religion, race, national origin Performance ratings Names of employees who hold government-issued travel cards