Protecting Sensitive Information PA Turnpike Commission.

Slides:



Advertisements
Similar presentations
HIPAA Health Insurance Portability and Accountability Act of 1996
Advertisements

Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
Gaucho Round-Up FAQ’s This presentation covers some of the FAQ’s about campus clean-up day. Presentation #4 2/3/
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
The Health Insurance Portability and Accountability Act Basic HIPAA Training For CMU workforce with access to PHI.
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Corporate Compliance Program STANDARDS OF CONDUCT HIPAA PRIVACY & SECURITY Temple University Health System Maribel Valentin, Esquire Associate Counsel.
NAU HIPAA Awareness Training
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
Springfield Technical Community College Security Awareness Training.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Destroying Confidential and Restricted Information Presentation #3 12/11/2014 This presentation defines confidential and restricted information and gives.
Critical Data Management Indiana University HR Summit April 24, 2014.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
HFS DATA SECURITY TRAINING
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Security Awareness Training PA Turnpike Commission.
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
10 Essential Security Measures PA Turnpike Commission.
HIPAA Health Insurance Portability & Accountability Act of 1996.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Next ETCH Confidentiality and HIPAA Annual Review What you need to know. The Privacy Rule 1.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
Florida Information Protection Act of 2014 (FIPA).
Privacy and Information Management ICT Guidelines.
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
University Health Care Computer Systems Fellows, Residents, & Interns.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Children’s Hospital Requirements for Remote Access.
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
Data Breach: How to Get Your Campus on the Front Page of the Chronicle?
HIPAA Health Insurance Portability and Accountability Act of 1996.
Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Western Asset Protection
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
ANNUAL HIPAA AND INFORMATION SECURITY EDUCATION. KEY TERMS  HIPAA - Health Insurance Portability and Accountability Act. The primary goal of the law.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
1 HIPAA Information Security Awareness Training “Good Computing Practices” for Confidential Electronic Information For All NXC Employees October 2011.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Reviewed by: Gunther Kohn Chief Information Officer, UB School of Dental Medicine Date: October 20, 2015 Approved by: Sarah L. Augustynek Compliance Officer,
Developed for Ridgeview Institute 2015 Hospital Wide Orientation
Payment Card Industry (PCI) Rules and Standards
HIPAA Privacy and Security
Protecting PHI & PII 12/30/2017 6:45 AM
HIPAA Privacy & Security
Florida Information Protection Act of 2014 (FIPA)
Florida Information Protection Act of 2014 (FIPA)
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
The Health Insurance Portability and Accountability Act
HIPAA Privacy & Security
HIPAA Overview.
HIPAA & PHI TRAINING & AWARENESS
The Health Insurance Portability and Accountability Act
School of Medicine Orientation Information Security Training
Presentation transcript:

Protecting Sensitive Information PA Turnpike Commission

Sensitive Information Examples of sensitive information include: PTC corporate information. Personal Information. Health or Medical Information. Financial information (credit card data, bank account number). Personal Information Protected by Anti-Discrimination and Information Privacy Laws.

PTC Corporate Information Every effort must be made to ensure the confidentiality, integrity, and availability of PTC information assets. All members of the PTC workforce must be prudent in the use of information acquired in the course of their duties, and not use confidential information for any personal gain nor in any manner which would be contrary or detrimental to the welfare of the PTC. The unauthorized access to, disclosure or dissemination of PTC or other sensitive information is not permitted.

Personal Identity Information An individuals first name or first initial and last name in combination with and linked to any one or more of the following elements, when these elements are not encrypted or redacted: Social Security Number, (SSN). Drivers License Number or state ID card. Financial account number, credit or debit card number, in combination with any security code that could permit access to an individuals financial account. Note: The term redact means alteration or truncation so that no more than the last 4 digits of the SSN or drivers license number is accessible as part of the data.

Personal Identity Information Personal Identity Information is protected by state law. PA SB 712 – Breach of Personal Information Notification Act requires that PA residents be notified in instances where their personal data was or may have been disclosed due to a security system breach, and it further imposes penalties for failure to provide the required notifications.

Electronic Protected Health Information (ePHI) Computer based patient health information which is created, received, stored or maintained, processed and/or transmitted by the PTC. Examples: Medical record number, account number, or SSN. Patient demographic data, e.g. address, date of birth, date of death, sex, /web address. Dates of service, e.g. date of admission, discharge. Medical records, reports, test results, appointment dates.

Electronic Protected Health Information (ePHI) ePHI is protected by federal law. Health Insurance Portability and Accountability Act, (HIPAA), Privacy & Security Rules mandate protection and safeguards for access, use and disclosure of PHI and/or ePHI with sanctions for violations.

Credit Card Information Credit card information is regulated by the Payment Card Industry (PCI) Data Security Standard. Description of the PCI Standard: A set of data security requirements that apply to all employees, merchants, vendors, service providers, contractors and business partners who store, process or transmit [credit] cardholder data, as well as to all system components included in or connected to the cardholder data environment. System components include network components, servers or applications.

Personal Information Protected by Anti- Discrimination and Information Privacy Laws Examples: Ethnicity. Gender. Date of birth. Citizenship. Marital Status. Religion. Sexual orientation. Home address or home telephone number.

How To Protect Sensitive Information 1. Know where this data exists. All sensitive information must be protected. Knowing what you have and where it is, is an important first step. Note: Remember, sensitive information can also be in current or old hardcopy or electronic files, including archives.

How To Protect Sensitive Information 2. Destroy sensitive information which is no longer needed. The best way to protect restricted data is not to have it in the first place. Shred or otherwise destroy sensitive data before throwing it away. It is not uncommon to find all sorts of sensitive and even confidential information in trash cans, and dumpsters.. Even vacation schedules could be used by a resourceful hacker to justify a phony request for information, so consider anything that is not public information to be sensitive. Dispose of electronic media, such as CDs appropriately. Contact the IT Service Desk, at ext. 5678, for additional information.

How To Protect Sensitive Information 3. Never share or discuss sensitive information with unauthorized individuals. And, never share your user ID with another individual, or use another individual’s user ID. 4. Know who has access to network drives and folders before you put sensitive information there. 5. Don’t put sensitive information in locations that are accessible from the Internet. 6. Don’t leave sensitive information lying around, including on remote printers, fax machines, or copiers - or even in your area when you step away. 7. Set up your workstation so that passersby cannot see the information on your monitor.

Storage of Sensitive Information The storage of sensitive information on any non-PTC computing device or media is expressly prohibited. The permanent storage of sensitive information on any portable PTC computing device, i.e. laptop, personal digital assistant (PDA), smart phone, is not permitted. In instances where sensitive information must be temporarily stored on a portable PTC computing device, an approved corporate solution, typically encryption, must be installed and enabled on the device. Contact the IT Service Desk, at ext. 5678, for additional information. They will assist in obtaining the appropriate encryption solution, or appropriate media, such as a password protected encrypted USB drive, to meet your business need.

Transferring and Downloading Sensitive Information Transmission of sensitive information in clear text over a public network is not permitted. Sensitive information must only be transmitted over secure channels or using an encryption solution. Examples: When using the Internet, secure channels such as HTTPS, or SFTP will provide a relatively secure connection. When using , the contents of the must be encrypted using a PTC approved encryption solution.

The different modules of this tutorial will: Discuss the risks to your computer and the data it contains. Provide some guidelines for avoiding risks. Suggest some practical and easy solutions. Please review these modules at your convenience.