Employee Privacy & Monitoring Technologies November 16, 2006 TBTLA Andy Swenson Len Chiacchia Chris Favaloro Mark Wright.

Slides:



Advertisements
Similar presentations
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
Advertisements

Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
Changes to HIPAA (as they pertain to records management) Health Information Technology for Economic Clinical Health Act (HITECH) – federal regulation included.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
EDiscovery and Records Management. Records Management- Historical Perspective- Paper Historically- Paper was the “Corporate Memory” – a physical entity.
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
Developing a Records & Information Retention & Disposition Program:
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Business Plug-In B7 Ethics.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
The CPA Profession Chapter 2.
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
New Data Regulation Law 201 CMR TJX Video.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
© 2010 Dorsey & Whitney LLP Social Media Friday, September 17, 2010 The Committee on Finance & Information Technology (CFIT)
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Do you Know Where your Data is? Gregory P. Silberman, CISSP Technology Intellectual Property & Outsourcing Group Kaye Scholer LLP May 10, 2005.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
HIPAA PRIVACY AND SECURITY AWARENESS.
ISMS for Mobile Devices Page 1 ISO/IEC Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview.
Principle of Protection By C’Les Jensema About ARMA International and the Generally Accepted Recordkeeping Principles® ARMA International (
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
Health Insurance Portability and Accountability Act (HIPAA)
STORAGE MANAGEMENT/ EXECUTIVE: Managing a Compliant Infrastructure Processes and Procedures Mike Casey Principal Analyst Contoural Inc.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
EDiscovery, Records Management and Records Retention.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Dangerous Documents. Legal Compliances State and federal laws Contractual obligations Subject to an affirmative legal duty to establish and maintain certain.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
Information and Records Management INFM 718X/LBSC 708X Seminar on E-Discovery.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
University Policy towards Privacy and Network Use Group Members: Serena Lam, Sarah Hong, Charlie Korschun, Zan Fort, Kristen France, and Jason Saltiel.
Lexmundi.com TRADE SECRET PROTECTION IN THE DIGITAL AGE Eric H. Rumbaugh Partner Michael Best & Friedrich LLP Lex Mundi member firm for Wisconsin This.
Unit 7 Seminar.  According to Sanderson (2009), the problems with the current paper-based health record system have been well documented. The author.
Compliance August 18, Agenda Outline Status Draft of Answers.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Recordkeeping and Record Retention KATHLEEN L. MIZEJEWSKI, CPP, GBA March 20, 2010.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Technology & Private Practice: Understanding the Legal & Ethical Challenges Bianca Puglia, Ph.D., LPC, NCC/Puglia Counseling Services Panagiotis Markopoulos,
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
What is HIPAA? Health Insurance Portability and Accountability Act of HIPAA is a major law primarily concentrating on the prolongation of health.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Juvenile Legislative Update 2013 Confidential Records and Protected Disclosures.
Leveraging the Data Map – A Case Study November 15, 2016
Privacy & Confidentiality
HIPAA.
Move this to online module slides 11-56
Red Flags Rule An Introduction County College of Morris
HIPAA Implementation Strategies for Compliance Professionals
HIPAA Implementation Strategies for Compliance Professionals
Health Care: Privacy in a Digital Age
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
The Health Insurance Portability and Accountability Act
Lesson 1: Introduction to HIPAA
Presentation transcript:

Employee Privacy & Monitoring Technologies November 16, 2006 TBTLA Andy Swenson Len Chiacchia Chris Favaloro Mark Wright

Agenda Employee Privacy Is Monitoring ethical and legal? Why Monitor? Monitoring Technologies Maintaining Implementing

Employee Privacy Privacy Defined : “The right to be left alone-the most comprehensive of rights, and the right most valued by a free people” - Justice Louis Brandeis (1928)

Ethical Is Monitoring Ethical? Depends on the View Employee View Want their Freedom Monitoring may feel like Big Brother May effect productivity or employee loyalty Company View Responsible for Protecting the Stakeholders Labeling Branding Trademarks Copyrights

Legal Is Monitoring Legal? Federal Law The Electronic Communications Privacy Act of 1986 (ECPA) Allows companies to monitor employees s and track usage if one of three stated provisions are adequately met. Employee has given consent Legitimate business reason Company needs to protect itself

Legal Is Monitoring Legal? State Law The 2006 Florida Statutes – Chapter Allows companies to monitor employees as long as All Parties Consent

Why Monitor Required Financial Securities and Exchange Commission's Code of Federal Regulations (CFR) 17a-3 and 17a-4) 3 – 6 years or longer depending on the data Must be readily accessible for first 2 years Sarbanes-Oxley Auditing Firms – All Communications -7 years GAAP – General Accepted Accounting Principles GAPP – General Accepted Privacy Principles

Why Monitor Required Medical HIPAA (HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996) “the clinical record retention rules for a given jurisdiction would govern as to the length of time the record must be preserved” American Psychiatric Association Council on Psychiatry and Law

Why Monitor Required ISPs- Internet Service Providers 1986 ECPA (Electronic Communications Privacy Act) Currently Requested to keep data for 90 days Proposed Dept of Justice and FBI wants data kept for 2 years ~USAToday; June 2006~

Why Monitor Protection/Liability IM – Instant Messaging Chat Room Discussion Databases Financial – (Non-Company Chat/Discussion Boards) Can be considered Public Appearances by NASD

Survey According to a 2005 Survey by the American Management Association: Privacy Rights Clearinghouse, % of employers monitor their employees' web site 65% use software to block connections to web sites 50% review and retain electronic mail messages. 80% of employers disclose their monitoring practices to employees 84% of employers have established policies governing use 81% have established policies governing personal Internet use

Survey According to a recent report from Business Performance Management Forum and AXS-One Inc: Senior Executives and subject matter Experts Interviewed NO Technologies or Policies in place to Handle a Legal Discovery Order NO Corporate Policy To Cover Electronic Records Mgmt Didn’t Know If They Had A Policy Enterprise Storage Forum, 2006

Applications Applications currently can record : s Sent and Received Instant Messages Key logging – Recording of keystrokes P2P file transactions Websites visited

Applications Secure Computing (A.K.A.CipherTrust) Offers Numerous Software Packages Web Gateway Messaging Gateway Network Gateway Identity and Access Management

Applications Akonix Five Different Appliance Technologies for Protection L7 Enterprise L7 Enforcer L7 Skype Manager L7 Remote Security Manager L7 Builder

Applications Websense Web Security Spyware and Keylogging Malicious Mobile Code Phishing and Pharming Secure IM Attachments Web Filtering Employee Productivity Bandwidth Management Legal Liability

Applications Websense Endpoint Security Internal Attack Prevention Application Content Control External Threat Mitigation Removable Media Management Remote Endpoint Protection

Maintaining All of these systems require additional costs Central Server (Refer to software requirements) Administrator to monitor system and make sure data is secure Policy implemented and in place before using the software Policy should be annually instated and reviewed by employees.

Implementation Define the Scope Monitoring (Too Much, Too Little) The Right People Fit the Person to the Job Personally Screen Remember “Loose Lips Sink Ships” Trained – Technical Forensics Privacy Administrator Chief Privacy Officer CISSP Certified Certified Information Systems Security Professional IAPO Certified International Association of Privacy Officers

Implementation Written Policy Handbook Signed Agreement Internal Web Site Training Employees Management Legally Sufficient "One of the biggest problems is the ambiguity with which these regulations are drafted,“ Peter Gerr - Analyst with Enterprise Storage Group

Implementation Data Storage/Retrieval Security of the Data Retrieving the Data Tamperproof Metadata

Litigation Effective December 1, 2006 New Civil Laws “regarding a company's duty to preserve and produce electronically stored information (ESI) in the face of litigation or pending litigation” Civil Rules 16, 26, 33, 34 and 37

Above ALL Get Corporate Counsel

Thank You Andy Swenson Len Chiacchia Chris Favaloro Mark Wright