Information Privacy and Security Quiz! Information Security Office Adapted with permission from the Educause and Internet 2 Information Security Task Force.

Slides:



Advertisements
Similar presentations
Basic Parts of a Computer I am a MONITOR. A monitor is the TV-set-like screen that displays video.
Advertisements

Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Thoughts on Technology Issues for Small Business Implementing Technical Safeguards to support Your Policies.
The Woodlands High School
This is the Venus Quiz Return to the beginning of the quiz. Meanings: Next Back Return to the Website.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Can you identify the components of a computer ? Press F5 to begin! 1 st Question.
Information Technology Resource Use Quiz! Information Security Office Adapted with permission from the Educause and Internet 2 Information Security Task.
Data Management Awareness January 23, University of Michigan Administrative Information Services Data Management Awareness Unit Liaisons January.
Securing Your Networks Personal Safety Rules Apply Here Too. Corporate Identity Theft SPAM.
QUALITY, ENVIRONMENTAL AND OCCUPATIONAL HEALTH AND SAFETY POLICY.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Test Your Knowledge By Catherine Phipps. x + 3 =6 a.5 b.4 c.3 d.2.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Practical Information Management
General Purpose Packages
An Educational Computer Based Training Program CBTCBT.
Computer Legislation The need for computer laws Go to Contents.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Information Technology & Communications Sensitive Data Use, Storage & Security Meeting Background Data Breach on February 18, 2014 Security Meeting with.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Test Your Knowledge. x + 3 =6 a.5 b.4 c.3 d.2 y - 11= 78 a. 69 b. 89 c. 87 d. 68.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
New Principal Training Property Control July 7, 2015.
Franklin D. Roosevelt and His New Deal After completing the lesson, and additional readings, complete the following quiz by clicking on the correct answer.
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Information Security Training for People who Supervise Computer Users.
Computer Quiz Beginners ICT Start. Created by Malcolm Fowler Select an input device from the list? Q1 1 Mouse 2 Speaker 3 Monitor 4 Hard drive Next question.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Quiz Title DIRECTIONS: Read each question and click on the correct answer. If you get it wrong use the arrow button to go back to the question and try.
Microsoft ® Office ® 2010 Office 2010 Security: Protecting your files.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
Mr S Paine Year 7. Which is the correct line of symmetry? This one? (Click here) This one? (Click here)
Information Systems Unit 3.
Managing Your Specialty Area Website: A What’s What and How-To Guide.
Christmas Around the World Matching Quiz Directions Think about the countries we studied this week. Think about the countries we studied this week. Look.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
TOP 10 DHS IT SECURITY & PRIVACY BEST PRACTICES #10 Contact The Office of Systems & Technology for appropriate ways to proceed if you need access to.
Created by Pamela Stepp The Coming Winter As the weather gets colder, people stay inside warm houses and wear heavy coats when they go outside. In the.
NC SALES ACTIVITY Leads & Opportunities Click to begin.
The physical parts of the computer
Final HIPAA Rule Special Training What you need to know to remain compliant with the new regulations.
DHHS Open Window Office of Procurement & Contract Services Login & Set up Profile.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
ValleyView Publishing.  To achieve a suitable location for the new office will be determined  To establish administrative systems  To establish an.
The physical parts of the computer
Information Security Seminar
Basic Parts of a Computer
Basic Parts of a Computer
Basic Parts of a Computer
CIS 349 Competitive Success/snaptutorial.com
CIS 349 Education for Service/snaptutorial.com
CIS 349 Teaching Effectively-- snaptutorial.com
Basic Parts of a Computer
The physical parts of the computer
Basic Parts of a Computer
The physical parts of the computer
Quiz Name Here Click to start.
Basic Parts of a Computer
Click Slide Show Tab Click From Beginning Complete Slide Show
Basic Parts of a Computer
Basic Parts of a Computer
Basic Parts of a Computer
Basic Parts of a Computer
Basic Parts of a Computer
Basic Parts of a Computer
Basic Parts of a Computer
Presentation transcript:

Information Privacy and Security Quiz! Information Security Office Adapted with permission from the Educause and Internet 2 Information Security Task Force

Information Privacy and Security Quiz The buttons provided will navigate you through the quiz. Please click the appropriate buttons or images when taking the quiz. NOT Do NOT use the keyboard or mouse-wheel to navigate the quiz. Use only the buttons provided. Good Luck! Click Here to Get Started Adapted with permission from the Educause and Internet 2 Information Security Task Force

Information Privacy and Security Quiz Question 1 of 5 Which of the following is NOT a goal of the Information Privacy and Security policy? To assure employees’ access to relevant data they need to conduct University business. To prevent unauthorized access to systems, data, facilities, and networks. To assure proper data storage methods are being followed as per the Proper Disposal Policy. To prevent any misuse of, or damage to, computer assets or data. Adapted with permission from the Educause and Internet 2 Information Security Task Force

Information Privacy and Security Quiz Oops! Click the arrow to try again Adapted with permission from the Educause and Internet 2 Information Security Task Force

Information Privacy and Security Quiz Way to Go! You’ve Got it! Click the star to continue Adapted with permission from the Educause and Internet 2 Information Security Task Force

Information Privacy and Security Quiz Question 2 of 5 This policy applies to university computing resources: On the University’s main campus. On any campus, including any satellite campuses. On any computer a University staff member is using to access work-related data. Everywhere. This policy applies to university data regardless of where the data resides. Adapted with permission from the Educause and Internet 2 Information Security Task Force

Information Privacy and Security Quiz Well, that’s partially correct! Click the arrow to try again Adapted with permission from the Educause and Internet 2 Information Security Task Force

Information Privacy and Security Quiz Way to Go! You’ve Got it! Click the star to continue Adapted with permission from the Educause and Internet 2 Information Security Task Force

Information Privacy and Security Quiz Question 3 of 5 Centralized computer facilities that house Peoplesoft data will be protected in an administrative building so that it can always be monitored. True False Adapted with permission from the Educause and Internet 2 Information Security Task Force

Information Privacy and Security Quiz Oops! Click the arrow to try again Adapted with permission from the Educause and Internet 2 Information Security Task Force

Information Privacy and Security Quiz Way to Go! You’ve Got it! – Peoplesoft data will be stored in a physically secure building Click the star to continue Adapted with permission from the Educause and Internet 2 Information Security Task Force

Information Privacy and Security Quiz Question 4 of 5 An employee's need to access data allows for: Data access only to complete assigned or designated functions. Data access for individuals who register with the Security & Privacy team in advance. Casual viewing access. Data access to be granted only by that employee’s supervisor or department-head. Adapted with permission from the Educause and Internet 2 Information Security Task Force

Information Privacy and Security Quiz Oops! Click the arrow to try again Adapted with permission from the Educause and Internet 2 Information Security Task Force

Information Privacy and Security Quiz Way to Go! You’ve Got it! Click the star to continue Adapted with permission from the Educause and Internet 2 Information Security Task Force

Information Privacy and Security Quiz Question 5 of 5 Which of the following is NOT true about the Information Privacy and Security Policy (IPSP)? The IPSP will evolve according to the needs of the university. The IPSP will change in response to new laws and other policies. The IPSP is reviewed periodically and updated as necessary. The IPSP only applies to IT staff. Adapted with permission from the Educause and Internet 2 Information Security Task Force

Information Privacy and Security Quiz Oops! Click the arrow to try again Adapted with permission from the Educause and Internet 2 Information Security Task Force

Information Privacy and Security Quiz Way to Go! You’ve Got it! Click the star to continue Adapted with permission from the Educause and Internet 2 Information Security Task Force

Congratulations! You’ve completed the quiz! To close this presentation, click the happy face. Adapted with permission from the Educause and Internet 2 Information Security Task Force