** Deckplate training for Navy Sailors **.  On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal.

Slides:



Advertisements
Similar presentations
606 CMR 14.00: Background Record Checks What you need to know!
Advertisements

Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
How to Obtain and Keep a Security Clearance?. What Is A Security Clearance? A determination made by the government that you are stable and trustworthy,
Office of Health, Safety and Security
Federal Retirement and Benefits Presented by Josephine Harris Human Resources Specialist U. S. Department of Agriculture September 2006.
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
NC1 WETZEL. Purpose  To revise policy and provide guidance for the establishment of a sexual assault prevention/victim assistance program within the.
Joint Personnel Adjudication System (JPAS) Overview
1 Identity Theft Information Recovery Program. 2 Crook.
Office of Personnel Management (OPM) Data Breach A briefing for use by DON commanders and supervisory staff
Army Family Advocacy Program 1 of R APR 06 Restricted Reporting Policy for Incidents of Domestic Abuse.
Network Centric Enterprise Public Trust Information and Navy Enterprise Resource Planning Presented to the Small Business and Industry Outreach Initiative.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
A briefing for use by DON commanders and supervisory staff Department of the Navy | United States Marine Corps1.
Act 168 of 2014 What is it? What does it mean to you?
1 Personal Health Information Data Breach. What Happened? March 10, 2012: Computer hackers illegally access a Department of Technology Services (DTS)
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
2015 ANNUAL TRAINING By: Denise Goff
Personnel Management SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
1 Personnel Security 2007 Data Protection Seminar TMA Privacy Office HEALTH AFFAIRS TRICARE Management Activity.
The U.S. Secret Service Shhhhhh!
Steven Burke Industrial Security Supervisor Lockheed Martin
July 18 th, 2014 Welcome! Provider Information Exchange Licensing Webinar.
Information Security Sharon Welna Information Security Officer.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Your Guide. Table of Contents Welcome to MyChart…………………………….…..3 How to Sign Up………………………………… MyChart Homepage (navigating through MyChart)……...
Jeff loses his identity! Lesson 8: Identity Theft.
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
ARMY BENEFITS CENTER-CIVILIAN BENEFITS OPEN SEASON Monday, November 10 through Monday, December 8, 2014.
Protecting Your Assets By Preventing Identity Theft 1.
Jeff loses his identity! Lesson 5: Identity Theft.
NARFE Service Office Committee Members Annuitant & Survivor Annuitant Help Electronic Training 2014.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Risky Business Week Protecting Your Identity: What to Know, What to Do Legal Division CSAA Insurance Group, a AAA Insurer.
Protecting Your Assets By Preventing Identity Theft
Small Business and Personal Credit
Teresa Brown Open Records Supervisor Plano Police Department
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Gift Card Risk Mitigation – Presentation A
Privacy of Client Data.
October 26, 2017 Main Line Association for Continuing Education
Cyber Security Awareness Workshop
How to Protect Yourself from ID Theft and Social Engineering
Cybersecurity Awareness
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk.
Protecting Your Identity:
Electronic Fingerprints
Red Flags Rule An Introduction County College of Morris
Identity Theft Prevention Program Training
Clemson University Red Flags Rule Training
Cyber Security: What the Head & Board Need to Know
Care Provider Background Screening Clearinghouse
Data Breach of United States Office of Personnel Management
Anatomy of a Common Cyber Attack
Presentation transcript:

** Deckplate training for Navy Sailors **

 On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal background investigation data of current, former, and prospective federal employees, military members, and contractors.  OPM provides Security Investigation services, including record retention, for the Department of Defense (DOD)  The data of as many as 21.5 million background investigation applicants, spouses or co- habitants, and others may have been compromised.  Background investigation (Standard Form (SF) 85, SF 85P, SF 86) data includes: – SSN – Residency & educational history – Employment history – Information about immediate family, personal & business acquaintances – Health (including mental health), criminal & financial history  Compromised information may also include: – Interview notes taken by background investigators – Fingerprints

 If you entered the service since 2000, hold a current security clearance, or have had a background investigation since 2000, you are affected – Request could be for either a new investigation or periodic re-investigation – Background investigations are requested by submitting Standard Form (SF) 85, 85P or 86 or by using the OPM electronic submission system  Less likely but possible, if you submitted a request for a background investigation prior to 2000 Affected Individuals will be officially notified by Defense Manpower Data Center via U.S. Postal Service correspondence beginning in September

 Data breaches involving personal information can result in a broad range of risks to military personnel including: – Identity theft – Targeting of individuals with knowledge of sensitive information – Intelligence activities that use personal information of U.S. citizens to undermine national security  Full scope of the risk is not fully known  If notified, it does not mean your identify will be stolen – but YOU ARE AT RISK

 Due to the scope of the OPM data breach, Navy cannot act independently  Response actions are being coordinated across the entire DOD  Upon official notification military members will be entitled to 3-years of No Cost Identify Theft Protection Services – $ 1 million dollars of identity theft insurance  Retroactive to date of OPM data breach – Full service identify restoration support and victim recovery assistance – Continuous credit monitoring – Fraud monitoring services beyond credit files – Identity monitoring for minor children  Official notifications will provide instructions for coverage enrollment  Enrollment is not required for identity theft insurance coverage – Claims process not yet established, will be in place prior to notifications

 Enroll for No Cost Identify Theft Protection Services if you are officially notified that your information was compromised in the OPM breach  Learn how to spot the warning signs of identity theft and protect yourself: IdentityTheft.gov – Get free credit reports – Set up fraud alerts on your accounts – Protect your children/minors from identify theft  Ensure you are vigilant about your personal information – Monitor your accounts – Be aware of phishing scams – Update account passwords frequently  Beware of attempts to solicit personal and work related information – If you are approached contact your commander, security manager, and NCIS

 The Navy source of information is the SECNAVs OPM Breach website: – Content includes:  Regularly updated Frequently Asked Questions section containing latest information  Briefings for commanders and supervisors  ALNAV Messages related to the OPM Breach  Additional resources and information  Defense Security Service Toolkit