The Scales of Justice Balancing Policy and Law Against Expectations in Real-Life Computer Abuse Cases.

Slides:



Advertisements
Similar presentations
Security, Privacy, Copyright, and Other Institutional Policy Implications of Online Learning Rodney J. Petersen, J.D. Policy Analyst & Security Task Force.
Advertisements

Red Flag Rules: What they are? & What you need to do
Crisis Communications for Security Issues: A Nightmare You Can Manage Marilu Goodyear Donna Liss Allison Rose Lopez Jenny Mehmedovic The University of.
 October 30, 2012Office of Student Services 1.  Melissa FiggeWelcome & Introductions  Becki Cohn-VargasBest Practices  Break  Didi HirschSocietySuicide.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. Health Insurance Portability and Accountability Act.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
Health Insurance Portability and Accountability Act (HIPAA)
Rape Crisis Centre Tukinainen Riitta Silver Development Manager in Legal Matters, Rape Crisis Centre Tukinainen, Finland Finland.
Data Breach Notification Toolkit Mary Ann Blair Director of Information Security Carnegie Mellon University September 2005 CSG Sponsored by the EDUCAUSE.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
Planning for the Elimination of Social Security Numbers as Primary Identifiers Mike Corn, University of Illinois Jenny Mehmedovic, University of Kansas.
Title IX Sexual Assault Prevention Saint Mary’s College of California STAFF DAY August 15, 2014 Eduardo Salaz, Associate Vice President, Chief Human Resources.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Community Safety Programme Board Priorities Stuart Priestley – Chief Community Safety Officer.
Data Security At Cornell Steve Schuster. Questions I’d like to Answer ► Why do we care about data security? ► What are our biggest challenges at Cornell?
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
New Faculty Orientation to Privacy and Security at UF Susan Blair, Chief Privacy Officer Kathy Bergsma, Information Security.
IT Security Challenges In Higher Education Steve Schuster Cornell University.
© 2003, EDUCAUSE Information Privacy: Public Policy and Institutional Policies Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
Tales from the Trenches Copyright Long, Mitrano, McGovern, and Orr, This work is the intellectual property of the authors. Permission is granted.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
Health Care Reform Implementation in Colorado Office of Governor John W. Hickenlooper April 2011.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
This presentation is approximately 20 minutes long. Please turn up your computer speakers and computer volume if needed. Annual Training and Orientation.
Presentation Outcomes Ensure you are aware of the resources available to you in the Dean of Students office Help you understand your role as Student Org.
Working Effectively with Law Enforcement: How to Protect the Privacy of Your University Community Without Going to Jail Michael Corn Director, Security.
Office of Compliance & Corporate Integrity Patient Privacy and Security of Patient Information Ray Braeunig, CHC, CHPC, CHRC Chief Compliance & Privacy.
Student Confidentiality: The FERPA/HIPAA Facts AISD Policy Student Records AISD Procedure AP. 11.
Mansfield University Developing Tomorrow’s Leaders New and Changing Laws and the Impact on Mansfield University 1.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Preventing and Responding to Sexual Misconduct: Sexual Harassment and Sexual Violence.
Incident Response CSG September 2004 Harvard University.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Beyond Newtown: How to Ensure Safe Schools and Communities April 29, 2013 Jenee’ Littrell Director of Guidance and Wellness Grossmont Union High School.
Addressing Unauthorized Release of Personal Information at UC Davis August 12, 2003.
Domestic Violence & Child Advocacy Center LINDA JOHANEK, CEO.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
Legal Issues Abroad Top 5 Risks Abroad Transportation Sexual Assault Inadequate Crisis Planning Inadequate Orientation Travel to Risky Locations.
Seth Walsh: Lessons Learned Randall Ranes, Director Instructional Support Services Division October 3, 2011.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Incident Documentation Campus Security Officer Training.
Educause Live! August 3, USA PATRIOT Act and Beyond: How Higher Education Institutions and Libraries are Cooperating and Coping Marilu Goodyear CIO.
Together for Girls: end sexual violence against children with a focus on girls Conduct national surveys and collect data Support coordinated program actions.
Ethical & Legal Issues MODULE FIVE:. Objectives: Students will: Understand privacy, confidentiality and ethics as they relate to being a volunteer. Understand.
Chapter 4: Laws, Regulations, and Compliance
Confidentiality Annual Training. Board Policy JG Please follow the link below to access the board policy dealing with student discipline and confidentiality.
Foundations of Organizational Information Assurance Fall 2007 Dr. Barbara Endicott-Popovsky IMT551.
 Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes.
CODE OF CONDUCT TRAINING We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Health Insurance Portability and Accountability Act (HIPAA) © 2013 Project Lead The Way, Inc.Principles of Biomedical Science.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
Health Insurance Portability and Accountability Act of 1996
Your Role as a Campus Security Authority
Ministry of the Interior of the CR
College of Adult & Professional Studies Criminal Justice Program
National Anti-Trafficking Coordination Mechanism in Latvia
Student Confidentiality: The FERPA/HIPAA Facts
University of Massachusetts Lowell
Employee Privacy and Privacy of Employee Information
Governance, Risk, and Compliance Systems in Higher Education
Privileged Communications
Health Insurance Portability and Accountability Act
Student Confidentiality: The FERPA/HIPAA Facts
Presentation transcript:

The Scales of Justice Balancing Policy and Law Against Expectations in Real-Life Computer Abuse Cases

Panelists Patti Orr: HIPAA and IT: A Prescription for Partnership and Leadership! –Director of User Services. Wellesley College Merri Beth Lavagnino: Anonymity Doesn’t Buy a “Get Out of Jail Free” Card for Hate Mail Sender –Deputy Information Technology Policy Officer Indiana University Jenny Mehmedovic: Border Crossing: Working with the Feds to Prevent International Identity Theft –Coordinator of IT Policy & Planning University of Kansas

Law, Policy and Partnership Law –Health Insurance Portability Accountability Act –Harassment and Intimidation –Illegal Immigration Reform and Immigrant Responsibility Act of 1996 USA-Patriot Act SEVIS Family Education Rights Privacy Act –Fraud and Abuse of Computer Act

Policy Computer Users' Privileges and Responsibilities Policy – pdfhttp:// pdf IT Security Policy – Incident Response Procedures Law Enforcement Response Procedures Crisis Communications Policy/Procedures

Partnerships Country Police and Prosecutor Dean of Students University Police University Counsel University Policy Office University Relations IT Security Health Services EDUCAUSE sites!

Managing Expectations Victims: Retribution and Justice –Information about policy process and discipline –Prosecutor – University – Victim interactions Balancing legal requirements and staff compliance…for “customers/clients/users” Balancing victims, law enforcement and public relations

Questions?