A briefing for use by DON commanders and supervisory staff Department of the Navy | United States Marine Corps1.

Slides:



Advertisements
Similar presentations
Compliance with Federal Trade Commission’s “Red Flag Rule”
Advertisements

Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
Employee Insurance Program Dependent Audit May 1, 2011 Laura Caldwell, Benefits Administrator.
Protecting Personal Information Guidance for Business.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up © 2009.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Florida Industrial Security Working Group (FISWG) SF86 Review Workshop Nannette Bell December 2012.
NC1 WETZEL. Purpose  To revise policy and provide guidance for the establishment of a sexual assault prevention/victim assistance program within the.
Joint Personnel Adjudication System (JPAS) Overview
© Chery F. Kendrick & Kendrick Technical Services.
1 Identity Theft Information Recovery Program. 2 Crook.
Office of Personnel Management (OPM) Data Breach A briefing for use by DON commanders and supervisory staff
“A NEW way of doing business” 1. WHAT IS eOPF?  The eOPF is the digitized re-creation of your hard copy Official Personnel File (OPF) which is currently.
Army Family Advocacy Program 1 of R APR 06 Restricted Reporting Policy for Incidents of Domestic Abuse.
Materials Developed By: CLARIFI CLARIFI ID Theft & Scams Don’t be a Victim.
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
U.S. Department of Agriculture HSPD 12 Program HSPD 12 Personal Identity Verification (PIV) I Core Training: Registrars.
THE SECURE AND FAIR ENFORCEMENT FOR MORTGAGE LICENSING ACT OF 2008 REQUIRED REGISTRATION BY THE SAFE ACT.
** Deckplate training for Navy Sailors **.  On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal.
2015 ANNUAL TRAINING By: Denise Goff
Ames Laboratory Privacy and Personally Identifiable Information (PII) Training Welcome to the Ames Laboratory’s training on Personally Identifiable Information.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Arkansas State Law Which Governs Sensitive Information…… Part 3B
1 Personnel Security 2007 Data Protection Seminar TMA Privacy Office HEALTH AFFAIRS TRICARE Management Activity.
Georgia Department of Human Services Division of Aging Services (DAS): Data Breach Presenter:Harold Johnson Acting General Counsel Presentation to: Board.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Steven Burke Industrial Security Supervisor Lockheed Martin
The Privacy Symposium – Summer 2008 Identity Theft Resource Center Jay Foley, Executive Director Presents: Privacy: Pre- and Post-Breach © Aug 2007.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Jeff loses his identity! Lesson 8: Identity Theft.
Privacy Act United States Army (Managerial Training)
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Identity Theft The fastest growing type of fraud..
Protecting Your Assets By Preventing Identity Theft
You’ve Been Hacked! What to do when your personal information has been compromised Paul T. Yoder, Information Systems Security Specialist.
Data Compromises: A Tax Practitioners “Nightmare”
Tax Identity Theft Presenter Date
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk.
Protecting Your Identity:
Red Flags Rule An Introduction County College of Morris
Protecting Yourself from Fraud including Identity Theft
Identity Theft Prevention Program Training
Protecting Yourself from Fraud including Identity Theft
Clemson University Red Flags Rule Training
Protecting Your Credit Identity
ssa security clearance process and completing the clearance forms
Protecting Yourself from Fraud including Identity Theft
ssa security clearance process and completing the clearance forms
Data Breach of United States Office of Personnel Management
Data Breach of United States Office of Personnel Management
Presentation transcript:

A briefing for use by DON commanders and supervisory staff Department of the Navy | United States Marine Corps1 Office of Personnel Management (OPM) Data Breach 03 Aug 2015

Incident Background  Cyber Incident 1, announced June 4, 2015  ~4.2 M current and former civilian employees impacted by a cybersecurity incident (December 2014)  Personal information includes: name, SSN, place and DOB, current and former addresses, education, training, employment information, etc.  Notification and letters in process (begun June 8)  Very likely that not all personnel have been contacted  Cyber Incident 2, announced June 18 & July 9, 2015  19.7 million former and current employees (military, civilian and contractor)  1.8 million others affected (spouses or co-habitants of employees)  1.1 million fingerprint records  Detailed personal information was lost in this breach – check the SF form you submitted!  Notification efforts are still in planning, but will likely include notifications by both and the U.S. Postal Service  eQIP – (Electronic Questionnaires for Investigations Processing) Event, suspended June 29 – July 23, 2015  eQIP is used by civilian employees, service members, and contractor employees, and Human Resource and Security Managers to send standard forms 85, 85P and 86 information to OPM  Temporary suspension (June 26 – July 23) as precautionary measure to close identified security vulnerabilities Department of the Navy | United States Marine Corps203 Aug 2015

Incident #1 (former & current federal employees)  April 2015 – OPM aware of cyber incident to have occurred December 2014  PII information compromised  Affected civilian employees automatically covered by 18 months of free identity theft insurance up to $1 million  Affected civilian employees also offered 18 months of credit monitoring if employees register their information with CSID  Credit monitoring is voluntary and you must enroll  Initial notification - from Subsequent notification -- U.S. Postal  CSID – industry leader for identity theft protection If s were deleted or you were not notified about Incident #1, contact CSID Toll Free at Department of the Navy | United States Marine Corps303 Aug 2015

Incident #2 (military, civilian, contractor former & current employees)  Affected 21.5 million background investigation applicants, spouses or co-habitants, others  Background investigation (SF85, 85p, 86) information accessed includes:  SSNs  Residency & educational history  Employment history  Information about immediate family, personal & business acquaintances  Health (including mental health), criminal & financial history  Usernames and passwords used to fill out background investigation forms  Personal information of spouse or cohabitant (including SSNs) compromised  If you wish to request a copy of your personnel security investigation go to: information-and-privacy-act-requests/ information-and-privacy-act-requests/  Notifications have not begun and affected personnel will be notified by U.S. Postal Service Mail and/or Highly likely to impact those who underwent a background investigation through OPM during 2000 or after; submissions prior to 2000 less likely Department of the Navy | United States Marine Corps403 Aug 2015

Incident #2 – Monitoring & Protection Services  Monitoring service provider not yet determined  Identity theft insurance and other protection for at least 3 years – no charge  Suite of services should include:  Full service identity restoration support and victim recovery assistance  Identity theft insurance  Identity monitoring for minor children  Continuous credit monitoring  Fraud monitoring services beyond credit files Services will be provided to impacted current/former civilian, military and contractor employees, their spouses (co-habitants) whose SSNs were compromised, and minor children Department of the Navy | United States Marine Corps503 Aug 2015

eQIP Actions  eQIP temporarily suspended by OPM 26 June  Precautionary measure - not a result of activity on the network/no evidence of exploitation  eQIP is the automated system for submission of SF85, 85p and 86 to OPM for workforce suitability and clearance eligibility determinations and investigations  Impacts civilians, contractors, military  Interim solution for secret clearances/CAC card continues until further notice  eQIP returned to service 23 July  New procedures in place for eQIP users – OPM will contact users detailing new instructions  USAJOBS is not impacted DON interim solution for secret clearances Top secret investigations/re-investigations resume Department of the Navy | United States Marine Corps603 Aug 2015

What is DON doing?  Senior Level DON data breach coordination cell  Committed to supporting all DON employees (civilian, military, contractor), sharing information  Designated website -  ALNAVs – #052/15; #056/15  DONhrFAQs  Identification, development, execution of risk mitigation strategies for DON processes Department of the Navy | United States Marine Corps703 Aug 2015

Table of Resources for Affected Individuals Resource Contact Info Provides CSID® Credit Monitoring Service U.S. toll free: International call collect: Assistance with signing up for CSID credit monitoring services for affected individuals. Department of Navy FAQ to data breach related questions. Department of the Navy Civilian Employee Assistance Program (DONCEAP) Toll free: DONCEAP ( ) TTY: International: Support for financial issues and identity theft for all DON civilians and their families. Federal Trade Commission (FTC) Complaint Submission Toll free: ID-THEFT ( ) A clearinghouse for complaints by victims of identity theft. Federal Trade Commission (FTC) Identity Theft Recovery Plan Downloadable PDF: A step by step guide on what to do if your identity information has been stolen. Free Credit Report Review Call: One free credit report per year from each of the three major crediting bureaus (contact information for credit bureaus can be found on the Federal Trade Commission website: Guide to Keeping Your Social Media Accounts Secure Safety guidelines and tips to keeping your personal information safe while using social media. Internal Revenue Service (IRS) Toll free: Guidance on what to do if you suspect the improper use of identification information in connection with tax violations. Phishing to report phishing attempts. Social Security Administration Toll free: Guidance on what to do if you suspect your Social Security number is being fraudulently used. TransUnion® Fraud Alert Call: Placing fraud alert on your credit file to let creditors know to contact you before opening a new account in your name. Department of the Navy | United States Marine Corps803 Aug 2015

Recap  What we know  Incident #1 - Process for Identity Theft and Option for Credit Monitoring; 18 months coverage  Incident #2 - Breadth of breach and identity theft/credit monitoring services; 3 years coverage  eQIP (used for clearances) has returned to service  Commands should continue to hire  What we don’t know  Monitoring service provider for Incident #2  What affected employees can do  Be vigilant concerning your personal information  Use the tools available (CSID, fraud alerts, etc.)  Monitor SECNAV website ( and FAQs  Check out the new Defense Security Service Toolkit (  Beware of attempts to solicit personal and work related information. If you are approached contact your commander, security manager and NCIS. Department of the Navy | United States Marine Corps903 Aug 2015

Questions (Civilian, Military, Contractor) Department of the Navy | United States Marine Corps1003 Aug 2015

Backup Department of the Navy | United States Marine Corps1103 Aug 2015

Leadership Talking Points  We understand the seriousness and impact that these incidents are having on our workforce, and we remain committed to keeping you updated.  There are two cybersecurity incidents  Incident #1 identified in April 2015 impacted former and current federal employees and compromised personal information.  OPM continues to notify personnel who may be affected - it is important to emphasize that the notification is ongoing and employees should not assume they have not been impacted if they have not received notification yet  Incident #1 — Notifications are ongoing  Because of the.com (dot-com) address, some notification messages went to the junk mail folder and were deleted.  Employees can contact CSID to authenticate their status, receive their PIN# and register.  Toll free number is – wait times are averaging 5-6 minutes  Incident #1 — Monitoring services  Complimentary identity theft insurance for 18 months. Every affected individual, regardless of whether or not they explicitly take action to enroll with their PIN#, will have up to $1 million of identity theft insurance and access to full-service identity restoration provided by CSID until December 7,  Enrolling in the CSID credit monitoring is voluntary on the part of civilian employees. Department of the Navy | United States Marine Corps1203 Aug 2015

Leadership Talking Points (2)  The second cyber incident was detected during the investigation of the first incident. OPM worked with DHS and FBI to determine who was affected by the second intrusion.  Information compromised in Incident #2 included sensitive and personal information provided in background investigations.  Incident #2 — Individuals affected will be notified by U.S. Postal Mail &  Deployed military and civilians may also receive notification if unable to contact by U.S. Postal Mail  Incident #2 — Impacted employees include former and current military, civilian and contractor personnel, their spouses or co-habitants  Incident #2 — Impacted employees/individuals and their minor children will receive at least 3 years of comprehensive monitoring and protection services; provider to be determined  The Department of the Navy recognizes the impact of the OPM breach on its employees, and is committed to sharing updated information with its employees. The Department regularly updates a set of Frequently Asked Questions with the latest information  We continue to accept questions at to best support our civilian workforce Refer to DON OPM Data Breach FAQs FAQs also available at OPM.gov Department of the Navy | United States Marine Corps1303 Aug 2015

Information about OPM  The Office of Personnel Management (OPM) is an independent agency of the United States government that provides oversight and policies governing the civil service of the federal government.independent agency of the United States governmentcivil service  OPM is part of the Executive Office of the President  OPM provides guidance, rules, regulations and oversight for employment of most federal civilian employees of the federal government, including most DOD employees.  For more information go to  OPM centrally stores personal and employment related information for most federal civil service employees, to include electronic Employee Personnel Folders (eOPF)  Federal agencies and employees, including DOD civilian employees, have access to an electronic folder instead of a paper record. Allows agencies and employees access from any location at any time.  Complies with federally mandated employee record management regulations.  For more information go to and search for eOPF.  OPM is the Personnel Suitability and Security Investigations service provider for most of the federal government, including most DOD military members, civilian employees, and contractor personnel  OPM conducts suitability and security investigations based on information contained in each individual member’s Standard Form 85, 85P and 86 – and results of checks of authoritative records and investigations.  OPM stores personal information related to these forms as well as some fingerprint information.  OPM also maintains investigation information developed during suitability and security investigations.  Once an investigation is completed, information from the standard forms and results of the investigations are forwarded to the DOD Central Adjudication Facility (DODCAF) for determination of suitability for employment and eligibility to maintain a security clearance.  For more information go to Department of the Navy | United States Marine Corps1403 Aug 2015

Incident #2 – Background Information Compromised  Social Security Numbers  Residency and educational history  Employment history  Personal and business acquaintances  Marital status  Information about children, immediate family and other relatives  Financial history [there is no evidence that separate systems that store information regarding the health, financial, payroll and retirement records of federal employees were impacted by the second incident (i.e., annuity rolls, retirement records, USAJOBS, Employee Express)]  Selective service record  Military history  Foreign contacts  Foreign activities, foreign business, professional activities, foreign government contacts  Foreign travel, passport information  Psychological and emotional health information  Police record, illegal use of drugs and drug activity, alcohol use  Investigations and clearance record  Criminal and non-criminal court cases  Association records Some records also include findings from interviews conducted by background investigators and fingerprint investigations. Usernames and passwords that applicants used to fill out their background investigation forms were also compromised. Department of the Navy | United States Marine Corps1503 Aug 2015