Information Security Information Security for Research Thursday October 14 th 2010.

Slides:



Advertisements
Similar presentations
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Financial Services Workshop Margaret Umphrey ECU Information Security Officer March 12, IT Security, East Carolina University.
HIPAA Security.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
Jeopardy $100 Access Controls Faxing My Workstation Pot Luck $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200.
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
Maintaining Security While Using Computers What all of Our Computer Users Need to Know.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
June 04, 2013 Robin Thomas, NC III, Presenter. PRIVACY BREACHES A privacy breach is an unauthorized disclosure of PHI/PCI violating either Federal or.
Privacy, Security, Confidentiality, and Legal Issues
Springfield Technical Community College Security Awareness Training.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
CREATED BY: HMIS Security Awareness Approved 1/10/2012 Revised 1/29/2013 Revised 3/15/2013.
BUS VIDEO RECORDINGS COLLECTION – PROCESSING - REDACTION - SHARING WHAT IS RIGHT FOR YOUR DISTRICT?
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
ORO Findings on Privacy, Confidentiality, and Information Security Peter N. Poon, JD, MA, CIPP/G Office of Research Oversight Initially presented June.
Critical Data Management Indiana University HR Summit April 24, 2014.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
THE WHY AND HOW OF DATA SECURITY YOUR ROLE IN DATA STEWARDSHIP DEPARTMENT OF MEDICINE IT SERVICES.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
HIPAA Privacy & Security EVMS Health Services 2004 Training.
VA OI&T Field Security Service Seal of the U.S. Department of Veterans Affairs Office of Information and Technology Office of Information Security.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Data Access and Data Sharing KDE Employee Training Data Security Video Series 2 of 3 October 2014.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Information Governance Jym Bates Head of Information Assurance.
Information Security Technological Security Implementation and Privacy Protection.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Module #2: What Sensitive Data is and how to handle it Module 2 is approximately 3min and 30 sec.
PRIVACY AND INFORMATION SECURITY ESSENTIALS Information Security Policy Essentials Melissa Short, IT Specialist Office of Cyber Security- Policy.
Best Practices for Protecting Data. Section Overview Mobile Computing Devices Technical Procedures Data Access and Permissions Verbal Communication Paper.
Ames Laboratory Privacy and Personally Identifiable Information (PII) Training Welcome to the Ames Laboratory’s training on Personally Identifiable Information.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
©Holm Publications Security Awareness Presentation.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Privacy and Information Management ICT Guidelines.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
Murphy’s Law If anything can go wrong, it will.. 2 Data Security and Confidentiality “… a firm belief in Murphy’s Law and in the necessity to try and.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Incident Security & Confidentiality Integrity Availability.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Western Asset Protection
FISMA 101.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
Final HIPAA Rule Special Training What you need to know to remain compliant with the new regulations.
Information Management and the Departing Employee.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Company Proprietary and Confidential Texas Association of Community Health Centers - Proprietary and Confidential Fourth and Goal: Score with Meaningful.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Service Point 5 ReportWriter How to run reports in ReportWriter.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
HIPAA Privacy and Security
County HIPAA Review All Rights Reserved 2002.
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
13 Managing Medical Records Lesson 3:
Introduction to the PACS Security
Presentation transcript:

Information Security Information Security for Research Thursday October 14 th 2010

2 Information Security Officers (ISO)  Terry Peters  (352) x4114  Patrick Cheek  (352) x4492

3 Overview  Protocol Approval  Sensitive Information  Authority to Transport  Electronic Data Storage  Paper Data  Storing VA Research Data at UF  Data Transfer Agreements  Confidentially  Passwords  Laptops  Sponsor Equipment  Backups  PKI  Incidents  Media Disposal  Other Information

Protocol ISO Approval  Key items to be identified in your protocol.  Who is the sponsor?  Will sensitive data be transferred to the sponsor?  How are you transferring the data?  Will data be transported outside the protected environment?  Will any sensitive data be stored outside the protected environment?  Where will the electronic data be stored? Be specific.  Where will any paper data be stored? Be specific  Is there any sponsor provided computers, laptops, thumb drives?  Is the protocol approved at another VA facility and will data be transferred?

Sensitive Information  Sensitive Information: VA sensitive information is all Department data, on any  storage media or in any form or format, which requires protection due to the risk of harm  that could result from inadvertent or deliberate disclosure, alteration, or destruction of  the information. The term includes information whose improper use or disclosure could  adversely affect the ability of an agency to accomplish its mission; proprietary  information; records about individuals requiring protection under various confidentiality  provisions such as the Privacy Act and the HIPAA Privacy Rule; and information that  can be withheld under the Freedom of Information Act. Examples of VA sensitive  information include the following: individually-identifiable medical, benefits, and  personnel information; financial; budgetary; research; quality assurance; confidential  commercial; critical infrastructure; investigation, and law enforcement information;  information that is confidential and privileged in litigation such as that which is protected  by the deliberative process privilege, attorney work-product privilege, or the attorneyclient  privilege; and other information which, if released, could result in violation of law  or harm or unfairness to any individual or group, or could adversely affect the national  interest or the conduct of federal programs.

Authority to Transport  Required when removing sensitive data from the VA Protected Environment.  Examples of outside the Protected Environment: Transporting to/from: RORC to Malcom Randall Malcom Randall to UF Malcom Randall to Lake City

Authority to Transport  Where do I get the form letter?  ISO SharePoint Site under “Shared Documents” “Forms”. orida/directorsoffice/infosecurity/default.as px

Authority to Transport You must have a completed form signed by your supervisor, Service Chief, CIO, Director and ISO before you can transport. Recommend you complete the form while your protocol is going through the approval process.

Electronic Data Storage  Store your data in a secure folder on the VA network. The folder should only be accessible by investigators assigned to your study.  Backup data stored on PCs and Thumb Drives daily to your secure folder on the VA network.

Paper Data  Store in locked cabinets/containers inside the protected environment.  Only investigators approved for your study should have access to the cabinets/containers. 10

Storing VA Research Data at UF  Not authorized  Why? VA electronic data must be stored on systems that are Federal Information Security Act (FISMA) compliant. UF computer system is not FISMA compliant. 11

Data Transfer/Data Use Agreements  VHA Handbook  Use Appendix C to determine if a DTA/DUA is required for your study.  If required submit tion.asp?pub_ID=

Maintaining Confidentiality * It is your responsibility Lock your computer automatic log off Ctrl + Alt + Delete  Printing PII take it from the printer right away keep it stored in a secure place.  Only access information you need to do your job.  Never discuss a Veterans personal information in public

14 Passwords  Must be changed every 90 days  Have at least 8 characters  Use at least 3 of the following Upper-case letters (ABC…) Lower-case letters (…xyz) Special characters (#, &, *, Numbers ( )

15 Strong Password Rules  Do Not Use: words found in the dictionary personal references (name, birthday, address) automatic password-saving features  Never let anyone stand near you while you type your password  Keep it safe under lock and key **Not under your keyboard or mouse!!

Laptops  Must be purchased and authorized by IRM.  Must be encrypted using FIPS encryption.  How do I know its Encrypted? Contact IRM at  Returned every 90 days to IRM for checkup and updates.  My laptop does not have a VA inventory label with an EE number? Your laptop may not be encrypted, contact IRM. 16

Thumb Drives  Must request one in writing from IRM  Request form is on the ISO SharePoint site  Don’t store PHI/PII on them unless you have to, and ensure it is encrypted 17

Sponsor Provided Equipment  Laptops  Must be approved by the ISO and CIO.  Must be encrypted by IRM with a FIPS approved encryption.  Must be assigned an EE number by A&MMS.  Hard drive must be removed and turned-in to IRM before the laptop is returned to sponsor.  Thumb Drives  Not approved for use. Only VA approved FIPS encrypted thumb drives issued by IRM can be used.

Backing up Data  Backing up important data All VA data is backed up daily Back up your data on a periodic basis  Save information on a network drive such as your Homedrive This will ensure your data is backed up in case of computer failure or an office relocation Can log on to any computer with your data

PKI  Using Public Key Infrastructure (PKI) to encrypt a message Validating authenticity Maintaining confidentiality Protection from alteration.  REMEMBER: If you send Personally Identifiable Information (PII) in Outlook about a veteran or VA employee, it must be encrypted!!

Incident Identification and Reporting Computer Related Incidents  Several Examples of Security Incidents include: A virus A lost or stolen computer Missing or compromised files Unauthorized sharing of sensitive information Unauthorized access of Government IT systems  All information security incidents should be reported to your Supervisor, PO and ISO within 59 minutes!

Incident Identification and Reporting Computer Related Incidents  If you think a security incident has occurred: Gather information about what happened: Date, time, location Indicate the media that was compromised laptop, desktop, thumb drive, etc. If a laptop or thumb drive was the data encrypted? Was paper data involved? How many veterans are affected? What PHI/PII did the data contain? Name, DOB, SSAN, medical record, etc.  If the ISO is unavailable contact the VA- NSOC at (24/7 coverage)

Media Disposal  Clicking on the Delete button does NOT delete a file permanently from your computer. Software can restore all deleted files This is why hard drives are removed and destroyed from all PCs prior to leaving the VA

Media Disposal  Contact your ISO or IT staff if you have any media that needs to be destroyed.  To prevent accidental exposure of PII the VA has strict guidelines in place to ensure the proper sanitization and disposal of media containing VA sensitive information. Hard Drives CD-ROMs Flash Drives Optical Drives Sensitive Documents

Other Information  VPN from Malcom Randall to Shands  VPN from Shands to Malcom Randall  Storing VA Research Data at the Shands Data Center

Any Questions? Terry Peters (352) x4114 Patrick Cheek (352) x4492 Trailer 9