Information Security Awareness:

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
NAU HIPAA Awareness Training
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
Springfield Technical Community College Security Awareness Training.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
10 Essential Security Measures PA Turnpike Commission.
THE WHY AND HOW OF DATA SECURITY YOUR ROLE IN DATA STEWARDSHIP DEPARTMENT OF MEDICINE IT SERVICES.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
New Data Regulation Law 201 CMR TJX Video.
Protecting Sensitive Information PA Turnpike Commission.
Practical Information Management
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
CPS Acceptable Use Policy Day 2 – Technology Session.
HIPAA Privacy & Security Kay Carolin Barbara Ann Karmanos Cancer Center March 2009.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
ESCCO Data Security Training David Dixon September 2014.
1.1 System Performance Security Module 1 Version 5.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Best Practices for Protecting Data. Section Overview Mobile Computing Devices Technical Procedures Data Access and Permissions Verbal Communication Paper.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
©Holm Publications Security Awareness Presentation.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Privacy and Information Management ICT Guidelines.
University Health Care Computer Systems Fellows, Residents, & Interns.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Personal data protection in research projects
Policies and Security for Internet Access
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
ANNUAL HIPAA AND INFORMATION SECURITY EDUCATION. KEY TERMS  HIPAA - Health Insurance Portability and Accountability Act. The primary goal of the law.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Final HIPAA Rule Special Training What you need to know to remain compliant with the new regulations.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Computer Security Keeping you and your computer safe in the digital world.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Health Insurance Portability and Accountability Act (HIPAA) Primer for Observers, Volunteers, Medical Students Dr. Michael Palumbo- Privacy Officer/ EVP.
ISMS Information Security Management System
Payment Card Industry (PCI) Rules and Standards
HIPAA Privacy and Security
Protecting PHI & PII 12/30/2017 6:45 AM
DATA SECURITY FOR MEDICAL RESEARCH
East Carolina University
HIPAA Privacy & Security
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
County HIPAA Review All Rights Reserved 2002.
Lesson 2: Epic Security Considerations
HIPAA Privacy & Security
G061 - Network Security.
Presentation transcript:

Information Security Awareness: Building a Culture of Commitment to Security

Security Awareness is the knowledge and attitude members of an organization possess regarding the protection of the physical and, especially, information assets of that organization

UW Medicine IT Resources IT Services ITS provides information systems support for UW Medicine. Its core mission is to make a difference through the use of information technology for teaching, research and patient care. A few services ITS provides are Help Desk support, work station support, account support, and clinical systems administration. The ITS Help Desk can be reached at 206-543-7012 or mcsos@u.washington.edu

Other IT Resources UW Technology – www.washington.edu/uwtech or 206-221-5000 Departmental IT Provide local support for computing devices distributed by the department You If there is no assigned IT staff for a device then you are responsible for it’s security

Information Security Principles UW Medicine computers and data need protection Protection is based on the needs to preserve Confidentiality, Integrity and Availability Security is everyone’s responsibility Decision Box Determine if the IT security training is required for all staff. This may require system specific training for various users vs. general training for a majority of the staff. Make sure management understands: the benefits of IT security training on staff behavior, that is cost effective, and the need to invest in adequate staff training.

Data Classification Public = This is information that is either approved for general access, or by its nature, is not necessary to protect, and can be shared with anyone. Restricted = This is information which is intended strictly for use by designated parties and requires careful management. Confidential = This classification of information is very sensitive in nature, and requires careful controls and protection. Examples of confidential data include PHI, PII, and passwords

STRONG Passwords Why is it important to use strong passwords? Password guessing tools guess in 7 character sets. Lengths of 8 characters or more make it more difficult to guess An apparent random set of characters makes it more difficult for a hacker to guess. !@#$%&*, ABCD, abcd, 1234 Where supported a “pass phrase” should be used. They are easier to remember and much harder to break.

User ID and Password Management Your manager is responsible for making sure your access rights are correctly assigned initially and to update your access upon role changes, transfer or termination. Each workforce member is assigned a unique User ID and must not share it with anyone. Each system that a user has access to will be logged and tracked. All passwords must be changed every 120 days. It is the user’s responsibility to do this. UW Medicine Account or http://myuw.washington.edu AMC Login

Email Security Always be aware of phishing and social engineering scams, dangerous attachments, viruses, embedded links to malicious websites and social engineering All UW Medicine email is open to public disclosure Delete confidential emails as soon as they are no longer needed DO NOT forward confidential emails to a third party email system e.g., hotmail, yahoo, aol, gmail Check and double-check all messages containing restricted or confidential information for proper recipient email addresses Encrypt email messages when sending confidential information to email systems outside of UW Medicine

Mobile Device Security Mobile devices include laptops, Blackberries, smart phones, or any portable device capable of storing and interpreting data. Mobile devices are of special concern because they are easily lost and attractive to thieves. Personally owned mobile devices must comply with UW Medicine policies and standards when used for work purposes. The owner of the device is responsible. Encryption required when storing PHI, PII or passwords No automatic login, require password to log on to the device Passwords on these devices must be changed every 120 days Patched and up to date operating system

Data Transmission Security There are many other ways to transmit data electronically. They also require encryption as a protection in certain cases. Examples of other forms of transmission include faxes, instant messaging, text messaging, smart phones and other file sharing mechanisms. PII, PHI or passwords transmitted by any mechanism or device across non-UW Medicine networks or any wireless networks, must be encrypted.

Wireless Security Throughout UW Medicine, wireless networks are provided by UW Technology. These wireless networks are labeled “University of Washington”. UW Technology does not provide encryption for transmission of data on their wireless networks. When using wireless networks you must use encryption when transmitting PHI, PII or passwords. Always disable your wireless when not in use. Windows will automatically scan for known (trusted) wireless networks. Wireless networks are easily monitored by unauthorized individuals. Users should be aware that any transmitted data could be stolen unless encrypted.

Workstation/Work Area Security Workstations must be locked or logged out of when not in use or unattended. Never enter passwords or conduct UW Medicine business from 3rd party kiosks, such as an Internet café computer. Workforce members that use their personal computer for work must comply with the minimum computer security standard. Restricted or Confidential information in your work area must be secured when not in use. Always clear Restricted or Confidential information from printers immediately.

Risks of Web Browsing Users should be aware that even “trusted” websites can house malicious software. Clicking links on WebPages can download and run programs on your computer. Plug-ins should only be downloaded if absolutely necessary and after they are used should be removed. Where technically feasible an alternate web browser i.e. – Firefox, Opera, Safari should be used to conduct sensitive business.

Remote Access UW Medicine provides SSL VPN (encrypted transmission) for it’s remote access purposes. VPN access can be requested through IT Services Help Desk. Have your supervisor contact the Help Desk for the request form. Remote Access is only provided to conduct official UW Medicine business that is part of the requestors job function. Any transmission of PHI, PII, or passwords from a remote site to a UW Medicine site must be encrypted. This protection can be provided by the application, e.g. an SSL protected web application, or by VPN.

Copying of Data and Media Disposal Media is any portable device that is capable of storing electronic data. Examples include USB drives, CD/DVD, external hard drives, tapes, flash memory cards, etc. Once a workforce member removes data from a controlled system it becomes their responsibility to ensure the protection of the data. PHI, PII and passwords stored on media must be encrypted. Media containing restricted or confidential information must be destroyed in such a way to make the data unrecoverable when no longer needed.

Security Incident and Complaint Response Security Incidents are any event involving a breach or potential breach of a UW Medicine computing device or data. Security Complaints are a report of a suspected violation of UW Medicine policy, state or federal law, or other regulation. All UW Medicine workforce members must report security incidents and complaints to the ITS Help Desk. If you suspect a security incident has occurred on a UW Medicine computing device then you must not alter the state of the device. You should unplug the network cable and leave it powered on. A UW Medicine ITS or Compliance member will contact you once you report an incident or complaint.

Questions http://security.uwmedicine.org Brad Peda bpeda@u.washington.edu 206-616-5829