Persuasive Presentation Vins Chacko. Portable Storage Product Pocket-sized and light weight Can Carry on your key chain Encrypt portion of drive with.

Slides:



Advertisements
Similar presentations
ARMORINO Portable Privacy Platform. µcrypt µcrypt Armorino Information always has a value that constantly growing under pressure of new.
Advertisements

Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
HIPAA. Health Insurance Portability and Accountability Act.
Encryption – First line of defense Plamen Martinov Director of Systems and Security.
Springfield Technical Community College Security Awareness Training.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
KDE Employee Training. What IS a Data Breach? Unauthorized release (loss or theft) of Sensitive or Confidential Data, such as PII, PHI, etc. On site or.
Protection of personal mobile computer devices Information Security Isaac Fernandes, mci12009 Sofia Nunes, mci12014.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Locking the Backdoor: Computer Security and Medical Office Practice Dr. Maury Pinsk, FRCPC University of Alberta Division of Pediatric Nephrology.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
Iron Key and Portable Drive Security Zakary Littlefield.
You can run that from a USB Drive ? Portable Applications: the good, the bad and the ugly Jeff Gimbel © 2007.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Storage Devices or Backing Storage
+ Computer Password Manager Colin Raymond | Ritesh Sharma | Lubna Merchant | Sichen Sun | Kelechi Ajagba.
SECONDARY STORAGE DEVICES. MAGNETIC TAPE Data tape that stores large amounts of information that can only accessed sequentially. Commonly used for off-site.
Confidential Computer Systems Group HD Lock for Toshiba Notebook August 3rd, 2006.
Secondary Storage 7.
EVERYTHING YOU NEED TO KNOW ABOUT CLOUD STORAGE BY: JONATHAN SANBORN SECTION 005.
New Data Regulation Law 201 CMR TJX Video.
1 Developed by: U-MIC To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the.
Protecting Sensitive Information PA Turnpike Commission.
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
Introduction to computers. What is a personal computer? Capacity: Large hard disks combined with a large working memory (RAM) Speed: Fast. Normally measured.
Information Security Technological Security Implementation and Privacy Protection.
Karissa Fults Courtney Greif Grant Stein. A simple device Transport and store personal files Invented in late 1980’s Comes in different sizes and brands.
Module #2: What Sensitive Data is and how to handle it Module 2 is approximately 3min and 30 sec.
Storage Devices. Internal / External Hard Drive Also known as hard disks Internal drive stores the operating system software, application software and.
The secret to creative success is knowing how to hide your sources! — Albert Einstein.
ESCCO Data Security Training David Dixon September 2014.
1.1 System Performance Security Module 1 Version 5.
HQ Expectations of DOE Site IRBs Reporting Unanticipated Problems and Review/Approval of Projects that Use Personally Identifiable Information Libby White.
ADVANTAGES & DISADVANTAGES OF INTERNET STORAGE Advantage: Easy Access  Online storage websites are important to people who travel and don't always have.
Task 18 Describe the need to create backup copies, and to file them in a separate and safe location also filing and storing hard copies for use in production.
Getting organized was never so easy. Every person in the world will have some or the other Valuable Information which should be protected from anybody,
Group 2: Marco Hidalgo Wesley Lao Michelle Marquez-Lim
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
An innovative, electronic personal health record Overview.
Student Introduction to laptops Jim Moore. Laptop Basics Care of laptop Power switch/battery Floppy drive Mouse Sound & Jacks USB and Firewire CD player.
Advanced file encryption Copyright © 2002 Deerfield.com, All Rights Reserved.
Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.
 Online document storage and file sharing.  Access files from anywhere, store them free, and securely share them.  Great back up plan for storing those.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Portable Media USB Flash Drives Remember when… a keyboard was a piano a memory was something that you lost with age and a virus was the flu ?
Understand Encryption LESSON 2.5_A Security Fundamentals.
Encryption as a Preventive Countermeasure Sean Maher, Information Security Coordinator.
DiskGo! USB Flash Drive How-to-Use Guide. Capacity The DiskGo! USB Flash Drive will hold 64MB of data. 64MB of information is equivalent to approximately.
Government Agency’s Name April  At the end of this course, the learner will be able to: ◦ Define personally identifiable information ◦ List examples.
MAC OS – Unit A Page:14-15 Understand Storage Media.
Introduction Password Tracker is an application allows us to keep track of our web account password on a USB drive or on a Hard Disk in encrypted manner.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Safe Computing Practices. What is behind a cyber attack? 1.
There are many leading online sources that are providing reliable encryption solution for your online as well as offline file security through smart software.
Protecting Data at Rest Through Encryption CIO Summit November 30, 2007.
Pioneers in secure data storage devices. Users have become more accustomed to using multiple devices, are increasingly mobile, and are now used to storing.
Protecting PHI & PII 12/30/2017 6:45 AM
USB flash drive A flash drive consists of a small printed circuit board carrying the circuit elements and a USB connector, insulated electrically and protected.
REDCap and Vanderbilt’s Human Research Protection Program (VHRPP)
Cloud vs Local: Better Data Storage Device
Red Flags Rule An Introduction County College of Morris
How to Secure Your Laptops in 5 Easy Steps. Laptops Laptops have been the dynamic devices which brings about the finest portability and at the same time.
Lesson 1: Introduction to HIPAA
HQ Expectations of DOE Site IRBs
Secondary Storage Devices
Introduction to the PACS Security
IT Office hours – 1 Data Sharing 101
Presentation transcript:

Persuasive Presentation Vins Chacko

Portable Storage Product Pocket-sized and light weight Can Carry on your key chain Encrypt portion of drive with a drive letter Password protected Advanced Features – users and passwords (beyondifsolutions.com) Insure the confidentiality of sensitive data Secured USB Flash Drive

Need for Secured USB Flash Drive Safety for Records Identity Theft Prevention Health Insurance Portability and Accountability Act (HIPAA) Personal Identifiable Information (PII) President Bush’s Press Release (9/21/06) Being Proactive and safe

Satisfaction Safety of one another –Census bureau – 672 –1,138 laptops lost and 249 which contained PII No floppy drive capabilities on newer computers Meet all Safety requirements Imagine if you lost the Flash drive and it has encryption

What if.. Have one already Usually use Floppies and CD’s I already have a secured Flash Drive Better to have one with Security features Newer and comparable with New hard drives It could be a great gift to give

Action Price –Kingston for < $53.00 (512MB) –Buy.com for < $45.93 –Scandisk.com < $49.99 Local Stores Fry’s, Best Buy, Radio Shack, Office Max, Staples Durable – easy to store

On-Line Vendors

Thank You! Vins Chacko