University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.

Slides:



Advertisements
Similar presentations
Information for Students MGH Institute of Health Professions Use your down arrow or click your mouse to advance through the presentation.
Advertisements

Department of Information Systems Brigham and Womens Hospital Laptop Encryption Catherine McGoldrick Schroeder Corp. Mgr, BWH IS Management & Planning.
Data Protection Law In India iPleaders and Intelligent Legal Risk management LLP.
Welcome to the SPH Information Security Learning Module.
1 The Health Insurance Portability and Accountability Act (HIPAA) A guided tutorial for GVSU employees.
HIPAA Privacy Rule Training
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Amber LaFountain Project Archivist - Private Practices, Public Health Center for the History of Medicine Francis A. Countway Library of Medicine Harvard.
Health Insurance Portability and Accountability Act (HIPAA)
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
Data Protection.
FERPA: Family Educational Rights and Privacy Act.
Informed Consent and HIPAA Tim Noe Coordinating Center.
What is personally identifiable information (PII)? KDE Employee Training Data Security Video Series 1 of 3 October 2014.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA Health Insurance Portability & Accountability Act of 1996.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
HIPAA PRIVACY AND SECURITY AWARENESS.
An Educational Computer Based Training Program CBTCBT.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
STANDARD 5.3 Objective 3 Students will explain and understand the need for confidentiality.
Health Insurance Portability and Accountability Act (HIPAA)
Student Confidentiality: The FERPA/HIPAA Facts AISD Policy Student Records AISD Procedure AP. 11.
Florida Information Protection Act of 2014 (FIPA).
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
FERPA: What you Need to Know The Family Educational Rights and Privacy Act & SEI.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
SPH Information Security Update September 10, 2010.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
© Copyright 2010 Hemenway & Barnes LLP H&B
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES 1 The Technical Services Stuff in IT Services A brief tour of the technical and service offering plethora.
When you request technical support Please remember to request it by ing or calling , Even if you .
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Chapter 4: Laws, Regulations, and Compliance
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
QIP Education Session INFORMATION SECURITY Joseph Zurba Information Security & IT Compliance Officer Harvard Medical School February 16, 2015.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
CH 10. Confidentiality A. Confidentiality about sensitive medical information is necessary to preserve the patient’s dignity. B. In order to receive payment.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
Data Security Survival Skills for 21 st Century Evaluators Teresa Doksum & Sean Owen October 17, 2013.
FERPA Family Educational Rights and Privacy Act
HIPAA Privacy Rule Training
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
HIPAA CONFIDENTIALITY
Privacy & Confidentiality
Florida Information Protection Act of 2014 (FIPA)
HIPAA Administrative Simplification
Student Confidentiality: The FERPA/HIPAA Facts
Privacy and Confidentiality in Research
Florida Information Protection Act of 2014 (FIPA)
GENERAL DATA PROTECTION REGULATION (GDPR)
SHARING CLINICAL DATA: Legal and Privacy Issues
Disability Services Agencies Briefing On HIPAA
Welcome to the SPH Information Security Learning Module
Office of Information Security
HIPAA Policy & Procedure Strategies
Privacy Policy the Law….
Colorado “Protections For Consumer Data Privacy” Law
Student Confidentiality: The FERPA/HIPAA Facts
Presentation transcript:

University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information includes individually identifiable information which if disclosed would create risk of criminal liability, loss of insurability or employability, or severe social. psychological, reputational, financial or other harm to an individual or group. Level 5 includes research information classified as Level 5 by an IRB. Examples: information covered by a regulation or agreement that requires that data be stored or processed in a high security environment and on a computer not connected to the Harvard data networks, or to be handled in the same manner as the University’s most sensitive data; certain identifiable medical records and identifiable genetic information categorized as extremely sensitive. _______________________________ * “Harvard Confidential Information.” refers to all types of data under Levels 2-5. The higher the data level, the greater the required protection. Information that would likely cause serious harm to individuals or the University if disclosed. Level 4 information includes High Risk Confidential Information (HRCI), as defined below, and research information classified as Level 4 by an IRB. Level 4 also includes other individually identifiable information which if disclosed would likely cause risk of serious social, psychological, reputational. financial, legal or other harm to an individual or group. “High Risk Confidential Information” means an individual’s name together with any of the following data about that individual: social security number, bank or other financial account numbers, credit or debit card numbers, driver’s license number, passport number, other government-issued identification numbers, biometric data, health and medical information, or data about the individual obtained through a research project. Examples: personal financial or medical** information and information commonly used to establish identity protected by state, federal or foreign privacy laws and regulations, such as Massachusetts law protecting personal information, and not classified in Level 5; genetic information that is not in Level 5; national security information (subject to specific government requirements). _________ **See note below on HIPAA. For more information on Harvard ‘s data security policies, see ________________ To report a data breach, contact your Help Desk.

Level 2Level 1 Information the disclosure of which would not ordinarily cause material harm, but which the University has chosen to keep confidential. Level 2 information includes unpublished research work and intellectual property not in Level 3 or 4. Level 2 also includes information classified as Level 2 by an IRB. Examples: patent applications and work papers; drafts of research papers; building plans and information about the University physical plant. Public information. Examples: research data that has been de-identified in accordance with applicable rules; published research data; published information about the University; course catalogs; directory information about students who have not requested a FERPA block; faculty and staff directory information. University Data Classification Table Level 3 Information that presents a risk of material harm to individuals or the University if disclosed. Level 3 information includes individually identifiable information which if disclosed could reasonably be expected to be damaging to reputation or to cause legal liability +. Level 3 also includes research information classified as Level 3 by an IRB. Examples: information protected by the Family Educational Rights and Privacy Act (FERPA), to the extent such information is not covered under Level 4, including non-directory student information and directory information about students who have requested a FERPA block; HUIDs; Harvard personnel records ++ Harvard institutional financial records; individual donor information; personal information protected under most other state, federal and foreign privacy laws and not classified in Level 4 or 5. ________ + See note below on contractual obligations. ++ Harvard ‘s Confidential Information policy does not restrict or limit the rights of employees to discuss terms and conditions of their employment, including salary and benefits, with each other or with third parties. Note on Medical Records and HIPAA: Harvard units or programs that are so-called "covered entities" under the Health Insurance Portability and Accountability Act (HIPAA) must comply with HIPAA’s data security rules. As of the effective date of this policy, the covered entities are University Health Services, Harvard Dental Services, and certain University benefits plans. Other units or programs may be required to comply with HIPAA data security rules for limited purposes under the terms of specific contracts, such as a business associate agreement. HIPAA rules, when applicable, will take priority over Harvard’s data security requirements relating to medical records. Note on Contractual Obligations: Data use agreements, research consent forms and other contracts under which Harvard personnel receive confidential information from outside parties often state or are subject to specific data use and protection requirements. Harvard personnel working with such information must comply with such requirements. Use of such information must also comply with the applicable Harvard data security requirements if the contract calls for lesser levels of protection than the Harvard rules.