Data Security Overview ORSP Staff AT Desktop Service Team November 18th, 2014.

Slides:



Advertisements
Similar presentations
JPMorgan Chase Purchasing Card Training
Advertisements

ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking – Slide 1 Funded by a grant from Take Charge America,
Red Flag Rules: What they are? & What you need to do
DOCUMENTATION Missouri Medicaid Audit and Compliance Provider Certification Review Materials.
Springfield Technical Community College Security Awareness Training.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Presented by: Cassells & Associates, CPA, P.A.. Presented by: An always-on connection to your financials Accounting CS offers a completely new way to.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1EFT / My Reimbursements Project Division of Finance and ISC.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
DOCUMENTATION Missouri Medicaid Audit and Compliance Provider Certification Review Materials.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
Protecting Sensitive Information PA Turnpike Commission.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Information Security Phishing Update CTC
Electronic Records Management: What Management Needs to Know May 2009.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Data Risk and Security Andrew Roderick Campus Technology Committee – January 21, 2015.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
Florida Information Protection Act of 2014 (FIPA).
SPH Information Security Update September 10, 2010.
Cyber Security Awareness Month Using Your Laptop Safely On the Road Off-Campus Safe Computing Part 2.
Data Breach: How to Get Your Campus on the Front Page of the Chronicle?
When you request technical support Please remember to request it by ing or calling , Even if you .
Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.
e-Learning Module Credit/Debit Payment Card Acceptance and Security
When Can You Redact Information Without Requesting an Attorney General Decision? Karen Hattaway Assistant Attorney General Open Records Division Views.
STANFORD UNIVERSITY RESEARCH COMPUTING Are we outliers? Institutional minimum security requirements RUTH MARINSHAW OCTOBER 14, 2015.
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
IDENTITY FINDER TRAINING. What is Identity Finder?  Identity Finder is a program that is installed on your desktop, laptop, or server to locate personally.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
1.3.4.G1 Paycheck Basics Take Charge Today Introductory Level.
Chapter 1 Page ref. Chapter 1 Company File Setup and Maintenance 1.
Company File Setup and Maintenance Chapter 6. PAGE REF #CHAPTER 6: Company File Setup and Maintenance SLIDE # 2 2 Objectives Use the EasyStep Interview.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
UC Riverside Health Training and Development
Presented by: Harlow & Harlow, LLP
Take Charge of your Finances
Florida Information Protection Act of 2014 (FIPA)
Take Charge Today Introductory Level Paycheck Basics.
Take Charge of your Finances
Paycheck Basics.
Secure Electronic Transaction
Take Charge Today Introductory Level Paycheck Basics.
Florida Information Protection Act of 2014 (FIPA)
P-Card Bookkeeper Training
Welcome to the SPH Information Security Learning Module
University of South Florida Credit Card Presentation
Take Charge Today Introductory Level Paycheck Basics.
Take Charge Today Introductory Level Paycheck Basics.
Take Charge Today Introductory Level Paycheck Basics.
Take Charge Today Introductory Level Paycheck Basics.
Take Charge Today Introductory Level Paycheck Basics.
Personnel Training for Privacy
Take Charge of your Finances
Colorado “Protections For Consumer Data Privacy” Law
Banner Navigation.
Employee Self-Service (ESS) Portal
Take Charge Today Introductory Level Paycheck Basics.
School of Medicine Orientation Information Security Training
Presentation transcript:

Data Security Overview ORSP Staff AT Desktop Service Team November 18th, 2014

2 Objectives ORSP staff will be able to: Recognize confidential data Understand the risks of exposing confidential data Facilitate a dialog within ORSP for increasing security of confidential data

3 Why Data Security?

4 What Is Confidential Data? Passwords, credentials, or PIN’s Social Security Number and Name Birth date + four digits of SSN and Name Credit Card Numbers Tax ID + Name Driver’s License, State ID, Passport Health Insurance Information Medical or Psychological Counseling Records Bank Account or Debit Card + access code More….

5 What Does It Look Like? Budget Spreadsheets (pre-2009) Scanned ID for Travel Invoices (Tax ID)

6 Why Bother? Ethical: we care about the privacy of the records we handle on behalf of faculty, staff, and students Trust and Prestige: the University is entrusted with personal information; ORSP granting authority Disruption: when data is lost, lots of paperwork must be completed, processes changed Financial: security Breaches are calculated as a cost per record (sample cost = $64 per record) Think about the institutions you transact with (banking, medical, etc.). How do you want your personal data handled?

7 ORSP and Risk Liability 763,000 Social Security Numbers 4,000 are Credit Card Numbers 200 passwords (unanalyzed findings from sensitive data scan) Example cost: 50,000 SSN’s X $64 = $3,200,000

8 ORSP and Confidential Data If you’ve worked for ORSP for more than five years, you have confidential data in your file storage. Payroll: SSN’s for faculty, staff, student employees, contractors, etc. Fiscal: Vendor payment vouchers include Tax ID and business name Travel: Passports, CaDL, State ID Passwords: spreadsheets or text files with passwords to University system (or personal systems)

9 How Can I Protect My Work at ORSP? Recognize confidential data Remove unused/inactive confidential data files Stop using confidential data files Secure workstation, network, storage (AT Desktop) Be cautious of phishing Do not leave workstation unattended while logged into sensitive systems

11

12 ORSP Next Steps 1.Reduce the amount of old or unneeded data in ORSP storage (and by proxy, reducing the amount of confidential data) 2.Identify where ORSP uses confidential data in its workflow (where it currently uses it, where it can cease to use it)

13 Reduce Inactive Data Review existing share folders to identify non-active folders/files and those that are no longer needed

14 Where Does We Use Confidential Data? What ORSP work processes generated the confidential data? Are those processes still required?

15 More Resources… CSU Skillport Training (will be replacing former ESIP training) 1.Visit 2.Select "San Francisco" 3.Login with your SF State ID and password 4.Select "My Plan" For FERPA training: * Find "FERPA" and click "Launch" For Data Security & Privacy Training * Find "Data Security & Privacy" and click "Launch"

16 For Questions, Contact: AT Desktop Service Phone: Ticket: