Session 16: Distribution of Geospatial Data 1 Distribution of Geospatial Data in the Public Environment Hazard Mapping and Modeling.

Slides:



Advertisements
Similar presentations
Ways to Improve the Hazard Management Process
Advertisements

Museum Presentation Intermuseum Conservation Association.
FMS. 2 Fires Terrorism Internal Sabotage Natural Disasters System Failures Power Outages Pandemic Influenza COOP/ Disaster Recovery/ Emergency Preparedness.
Practical Preparations Planning for Safety and Emergencies.
Department of Homeland Security Site Assistance Visit (SAV)
The Individual Health Plan Essential to achieve educational equality for students with health management needs Ensures access to an education for students.
Facilitating a Dialog between the NSDI and Utility Companies J. Peter Gomez Manager, Information Requirements, Xcel Energy.
The Day After The Shakeout Place your Counties Logo Here MT DES Exercises.
Planning Fundamentals  Include participation from all stakeholders in the community.  Use problem-solving process to help address the complexity and.
Security Controls – What Works
Introduction to the State-Level Mitigation 20/20 TM Software for Management of State-Level Hazard Mitigation Planning and Programming A software program.
Part One: Introduction and Federal GIS Response.
PPA 573 – Emergency Management and Homeland Security Lecture 4a – Disasters and Decisions.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Session 131 Hazard Mapping and Modeling Supporting Emergency Response Operations using GIS and Modeling.
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
Stephen S. Yau CSE , Fall Security Strategies.
Session 3 – Information Security Policies
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Workshop Summary ISPS Drills & Exercises Workshop Port Moresby 2006.
Foster and sustain the environmental and economic well being of the coast by linking people, information, and technology. Center Mission Coastal Hazards.
Information Asset Classification
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Maintaining Essential Business and Community Services During a Pandemic Paul R. Patrick, Director Bureau of Emergency Medical Services Utah Department.
Part of a Broader Strategy
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
Information Systems Security Computer System Life Cycle Security.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
This work was supported by Centers for Disease Control and Prevention Cooperative Agreement 1U01TP Public Health System Training in Disaster.
Unit 8:COOP Plan and Procedures  Explain purpose of a COOP plan  Propose an outline for a COOP plan  Identify procedures that can effectively support.
Risk Management - the process of identifying and controlling hazards to protect the force.  It’s five steps represent a logical thought process from.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Why We Create Metadata and How it is Useful Bruce Godfrey University of Idaho Library INSIDE Idaho
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Responsible Data Use: Data restrictions Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science.
Coordination and Net Working on DRR Rapid Emergency Assessment and Coordination Team (REACT) Bishkek November, 2009.
Effectively Managing Transit Emergencies. Nature of Emergencies and Disasters Overview What Is an Emergency? What Is a Disaster? Differences What Is Emergency.
Association of Defense Communities June 23, 2015
REDUCING DISASTER RISK THROUGH EFFECTIVE USE OF EARTH OBSERVATIONS Helen M. Wood Chair, U.S. Subcommittee on Disaster Reduction August.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
Responsible Data Use: Data Restrictions Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science.
2008 UASI Grants Regional Preparedness via I/O Technology and Geospatial Data.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Course # Unit 2 - OEP and PEMS. Unit 2 OEP and PEMS HQ OEP  OEP Mission  EP Website PEMS  Overview  Benefits  Current Functionality 
International Recovery Forum 2014 ~ The Role of Private Sector in Disaster Recovery ~ 21 January 2014 Kobe, Japan Dr Janet L. Asherson THE LINK BETWEEN.
Created by: Ashley Spivey For Department of Homeland Security All information from:
Environment and Disaster Planning Hari Srinivas, GDRC Rajib Shaw, Kyoto University Contents of the presentation: -What is the problem? -Precautionary Principles.
ISO/IEC 27001:2013 Annex A.8 Asset management
Secure Communications—No Compromise Real Time Communications in Emergency Response Planning and Operations Tim Vittetoe VIACK Corporation.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
McClain County Multi- Jurisdictional Multi-Hazard Mitigation Plan Update Image from
Session 171 Legal Issues in Utilizing Hazard Models and Mapping Hazard Mapping and Modeling.
Risk Identification and Risk Assessment
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Recreation & Security HPR 413. General Security Must encompass all operations of the organization Should be written into management plans – Plans include.
NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY Homeland Security Infrastructure Program (HSIP) Gold 2007 and Beyond William Mullen, Technical Executive North.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
1 Iowa Emergency Management Association Iowa Homeland Security and Emergency Management Department Emergency Management Program Development Course EMERGENCY.
Responsible Data Use: Data restrictions Robert R. Downs, PhD Center for International Earth Science Information Network (CIESIN), Columbia University Version.
Business Continuity Steven S. Keleman, CPM. Emergency Management Prevention Response Preparation Mitigation Recovery.
Overview Briefing Threat and Hazard Identification and Risk Assessment (THIRA) Presidential Policy Directive 8 / PPD-8: National Preparedness May 2012.
Disaster and Emergency Management
Providing Access to Your Data: Handling sensitive data
Data Security Policies
Chemical Purchasing.
Introduction to: National Response Plan (NRP)
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Presentation transcript:

Session 16: Distribution of Geospatial Data 1 Distribution of Geospatial Data in the Public Environment Hazard Mapping and Modeling

Session 16: Distribution of Geospatial Data 2 Objectives Understand the purposes, uses and risks associated with the distribution of geospatial data in the public environment. Explain the basis and nature of concerns raised by public, private and non-profit organizations in the distribution of geospatial data used in disaster preparedness, response, recovery and mitigation. Understand a methodology for balancing agency security risks and the benefits of geospatial data dissemination in a public environment.

Session 16: Distribution of Geospatial Data 3 The Need for Geospatial Information Timely, accurate geospatial information, and available to federal, state and local political jurisdictions is critical to effective decision making for emergency planning, response, and recovery. Geospatial Data – identifies the geographic location and characteristics (attributes) of natural or constructed features and boundaries on the earth. – derived from remote sensing, mapping, and surveying technologies.

Session 16: Distribution of Geospatial Data 4 The Need for Dissemination of Data Public, private and non-profit organizations collect, use, store and disseminate geospatial data. Organizations see that the sharing and distribution of data is critical to their mission success. Jurisdictions can not justify "going-their-own- way.“ Public private sharing of information is significant since some data sets may not be in the public sector.

Session 16: Distribution of Geospatial Data 5 Critical Information with Geospatial Data What will be the source for each data item? How will sharing be arranged including purchases, licenses, and other agreements? Who will own the data? How will new GIS data be integrated with existing data files (legacy systems)? Who will be responsible for updates to the data? How will the cost of the data (creation and maintenance) be allocated? Who will provide public access to the data? Who will be responsible for data archiving and retention?.. of the original?..of copies?

Session 16: Distribution of Geospatial Data 6 Uses of Geospatial Data Detection of threats or identification of hazards Identification of features at the local level or sites that are vulnerable to hazards. Geo-spatial information is thus critical in emergency planning. Used to prevent threats from hazards. Used to protect sites from threats or hazards. Used in response and recovery operations.

Session 16: Distribution of Geospatial Data 7 Real Time Access to Geospatial Data During Hurricane Katrina, response agencies made extensive use of updated requests for rescue. The U.S. Coast Guard use geospatial data to identify the location of water craft blocking waterways. Cleanup operations in the Gulf States used geospatial data in managing debris removal.

Session 16: Distribution of Geospatial Data 8 Releasing Geospatial Data The release of geospatial information may present the possibility of harm to an individual, family or an organization. The release of data poses a security risk. Critical infrastructure information may be too sensitive to be released to the public.

Session 16: Distribution of Geospatial Data 9 QUESTION: What types of data might be extremely sensitive and not made available to the public?

Session 16: Distribution of Geospatial Data 10 The National Geospatial Data Clearinghouse. Federal agencies that produce geospatial data must document these new data sets Metadata must be made available through the National Geospatial Data Clearinghouse. The Clearinghouse may be searched to determine what geo-spatial data exists, the nature and condition of the data and how to access the data. Some states also have identical requirements.

Session 16: Distribution of Geospatial Data 11 Handling Sensitive Data Agencies must have guidelines in the handling and release of sensitive data. Coordination of geospatial data is essential and requires extensive planning and preparedness. Providing access presents critical security issues. The goal is to provide quality data but also to ensure that safeguards are present to protect organizational security.

Session 16: Distribution of Geospatial Data 12 Value of Data to Other Organizations Our goal is to “build once and share or use many times” Support accomplishing operational missions. Allow for the free flow of information between the public, private and non-profit entities as well as the public. Supports informed public participation in decision-making and private reuse of government information

Session 16: Distribution of Geospatial Data 13 Key Terms Open-source Information Originating Organization Restrict Safeguard

Session 16: Distribution of Geospatial Data 14 Concerns Raised by the Distribution of Geospatial Data. Computer information technology allows organizations to take advantage of geospatial data Used in mapping, modeling, and communications.

Session 16: Distribution of Geospatial Data 15 Geospatial Data and Vulnerability Assessment Identify and repair the weakest links Takes advantage of tools such as firewalls, passwords, separate storage areas Build security into basic systems. Builds flexibility into systems. Allows users access to information that is appropriate for their needs.

Session 16: Distribution of Geospatial Data 16 QUESTION: Should any of the following types of information be restricted and limited access be made to the public or other agencies? Would any of the information be provided to other entities or the public but not the entire agency record? –911 emergency calls –Immunization records for students or public employees –Home inspection damage assessment reports

Session 16: Distribution of Geospatial Data 17 Systems Theory & Vulnerability Supports understanding our vulnerabilities to terrorist threats Can clarify the potential impacts of breakdowns or failures in our networks, information systems and operational procedures.

Session 16: Distribution of Geospatial Data 18 Distribution of Geospatial Data Authority of the agency to apply safeguards to geospatial data. The necessity to apply safeguards to the geospatial data. Safeguards are authorized and justified.

Session 16: Distribution of Geospatial Data 19 QUESTIONS: Assume that you have had a natural disaster in your community that involves fatalities. The news media want copies of all the 911 communication calls including the name and address of the caller and the nature of the call. Using the “Decision Tree,” would you release the data and if so in what form and with any restrictions? If the situation was a hazardous materials release that involved an accidental release of a toxic substance and fatalities occurred in the community, would the data from the 911 communications center be released?

Session 16: Distribution of Geospatial Data 20 Decision Tree for Providing Appropriate Access to Geospatial Data in Response to Security Concerns

Session 16: Distribution of Geospatial Data 21 QUESTION: Your community has leased property on a navigable waterway to a private contractor. The operator of your port handles all the shipping and receiving and transfers the shipments to rail and motor carrier transporters. You are asked by a local community group in a public meeting to release information on the hazardous materials shipments at the port and explain how much of the substances are on the site. What information would you give them?

Session 16: Distribution of Geospatial Data 22 Questions: Why is it so important to document your decisions as you progress through this decision tree? How can we insure that public agencies do not restrict data that ought to be made available to the public?