Do you Know Where your Data is? Gregory P. Silberman, CISSP Technology Intellectual Property & Outsourcing Group Kaye Scholer LLP May 10, 2005.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

The following 10 questions test your knowledge of Internet-based client management in Configuration Manager Configuration Manager 2007 Internet-Based.
and Electronic Records Retention: IT Requirements Paul Dworak Office of Compliance
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
Document &Record Control/Management Workshop Presenter: Gail Nelson Coffee Industry Board July 18, Central St. Catherine Coffee.
Review Questions Business 205
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Data Integrity and Data Retention Regulations. Increasing Data, Regulations … and Opportunities Source: Goff, John. “Drowning in Data.” CFO Magazine.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
EDiscovery and Records Management. Records Management- Historical Perspective- Paper Historically- Paper was the “Corporate Memory” – a physical entity.
Security Controls – What Works
…your guide through terrain
Developing a Records & Information Retention & Disposition Program:
Business Plug-In B7 Ethics.
1 E-Discovery Changes to Federal Rules of Civil Procedure Concerning Discovery of Electronically Stored Information (ESI) Effective Date: 12/01/2006 October,
EDiscovery and Records Management. Corporate Records Management Historically- Paper was the “Corporate memory”- a visible, physical entity. Original.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Steps to Compliance: Electronic Devices Overview PRESENTED BY.
1 From Filing Cabinet to Desktop and Network: Records Management in N.C. State Government Ed Southern Government Records Branch N.C. Office of Archives.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Retention and Disposition. Are messages public records? At NMU, all messages composed and maintained on University hardware are considered.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
Electronic Communications State Owned System Mandates Presented by: Eileen Goldgeier.
Electronic Records Management: What Management Needs to Know May 2009.
HIPAA PRIVACY AND SECURITY AWARENESS.
Archiving Records Offsite Using the State Records Center (SRC)
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Rachel Brooks, CPP. 3 is 4 4 is 3 OSHA is 5  FLSA requires certain records to be kept by covered employers for all employees and retained for either.
Copyright© 2010 WeComply, Inc. All rights reserved. 9/19/2015 Record Management.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
1 SECURITY & HIPAA DATA ENSURE INC. 798 PARK AVE. NW SUITE 204 NORTON, VA (276) D E.
Archiving Where did I put that mail?. Business criticity Importance to manage : –Authenticity –Integrity –Perennity –Compliance High TCO of mail.
EDiscovery, Records Management and Records Retention.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Archiving s. How to Manage Auto-Archive in Outlook Your Microsoft Outlook mailbox grows as you create and receive items. To manage the space.
© Copyright 2011, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers. ® CISO Executive Network Executive Breakfast.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Dangerous Documents. Legal Compliances State and federal laws Contractual obligations Subject to an affirmative legal duty to establish and maintain certain.
Records Management Is Not an Option Anymore
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
E-records and the law John D. Gregory Policy Division Ministry of the Attorney General May 14, 2007.
CORPORATE RECORDS RETENTION POLICY TRAINING By: Diana C. Toman, Corporate Counsel & Assistant Secretary.
Information and Records Management INFM 718X/LBSC 708X Seminar on E-Discovery.
Managing the Paper Mountain Kaushika Patel, Rockland BOCES Maureen McCarthy, Lower Hudson Regional Information Center.
All Employee Basic Records Management Training. Training Overview 1.Training Objectives 2.Clark County RIM Program 3.Key Concepts 4.Employee Responsibilities.
Recordkeeping and Record Retention KATHLEEN L. MIZEJEWSKI, CPP, GBA March 20, 2010.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
Chapter 4: Laws, Regulations, and Compliance
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Selecting what to keep and what to bin
Chapter 3: IRS and FTC Data Security Rules
Confidentiality October 14, 2005.
Move this to online module slides 11-56
Employee Privacy and Privacy of Employee Information
County HIPAA Review All Rights Reserved 2002.
What is a "Public Record" under the Local Records Act?
The Issues with Technology in education
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Good Spirit School Division
Presentation transcript:

Do you Know Where your Data is? Gregory P. Silberman, CISSP Technology Intellectual Property & Outsourcing Group Kaye Scholer LLP May 10, 2005

Policies, Standards, Guidelines  A policy is typically a document that outlines specific requirements or rules that must be met. In the information/network security realm, policies are usually point-specific, covering a single area. For example, an “Acceptable Use” policy would cover the rules and regulations for appropriate use of the computing facilities.  A standard is typically collections of system-specific or procedural- specific requirements that must be met by everyone. For example, you might have a standard that describes how to harden a Windows NT workstation for placement on an external (DMZ) network. People must follow this standard exactly if they wish to install a Windows NT workstation on an external network segment.  A guideline is typically a collection of system specific or procedural specific “suggestions” for best practice. They are not requirements to be met, but are strongly recommended. Effective security policies make frequent references to standards and guidelines that exist within an organization.

Isn’t data retention just about back up copies?  Collection  Use  Storage  Security  Destruction  The goal is to keep “good/necessary” data and delete unnecessary data.

So what data do I have to be concerned with?  It depends on the business, legal and personal use of the data. However, consider the following:   Instant Messaging  Voice Message  Employee Records  Customer/Client/Patient Information  Designs, Drawings, Schematics, Plans, Blueprints  Photographs, Movies, Sounds  Software  Log files

Isn’t this something MIS can take care of?  Business Requirement  Legal Requirements  Compliance  Civil Liability  Criminal Liability  Litigation/Discovery  Personal Requirements

Business Requirements  Work Product  Operational Necessity  Contractual Obligations  Disaster Recovery and Business Continuity

Legal Requirements  Local, State, Federal, International  HIPAA  COPPA  GLB  SOX  SEC  NASD  FDA  OSHA  PATRIOT  Privacy Policies  Insurance Regulations  Electronic Signatures  Video Rental Records  Department of Defense  California Security Database Breach Notification Act  Destruction of Evidence (Spoilation)

SEC 17a-3 and 17a-4  Enacted by the SEC in 1997, to allow brokers in the securities industry to store records electronically  17a-3: Requirement to make the records  17a-4: Requirement to keep the records  Written and enforceable retention policies  Storage of data on indelible, non-rewriteable media (WORM)  Searchable index of all stored data  Readily retrievable and viewable data  Storage of data offsite

NASD 3010/3110  Rules set by the National Association of Securities Dealers Inc. (NASD) to govern the behavior of security firms  Rule 3010: Supervision. Each firm must “supervise” their representatives activity, including monitoring incoming and outgoing  Rule 3110: Retention of Correspondence  Each member shall retain correspondence of registered representatives relating to its investment banking or securities business  Requirements pertaining to record keeping formats, mediums, and retention periods comply with SEC Rule 17a- 4

Personal Requirements  All data that is not governed by business or legal requirements.  Do not delete because you think it will hurt the company. Follow the policy.  Keep “personal” material off of company systems ( , programs, questionable web adventures)

Getting the Job Done  Build it yourself  Proprietary In-house Solution  License solution from someone else  EMC-Legato, Veritas-Enterprise Vault  Outsource the solution  SECCAS (seccas.com)

Backups  Do you know where they are?  Do you know what's on them?  Do you know who has access to them?  Are you sure they are any good?  What happened to the Y2K hard an electronic backups?  Are you sure these are the only backups?  How much disruption will there be if you have to change your practices to preserve data?

Software Development Issues  Who has access to your systems and data?  Are they subject to the same security?  Do you have contracts protecting your data?  Do your software developers need live or actual data?

Issues  Informal Nature causes people to write things as if they are saying them.  Problem of mass distribution an replication.  Deleting from your mailbox does not make it go away.  People tend to save “just in case”.  Tends to be used as a junk drawer and filing cabinet.  Think before you .

Outsourcing Issues  Do you actually have control over the data?  Are your policies, standards and guidelines still being followed?  Contract Provisions  Liability and Indemnification  Notification  Response to Problems  Are you now subject to the laws of another country?

Policy Outline  Purpose of the policy  Who is effected by this policy  What type of data and electronic systems are covered  Define key terms (legal and technical)  Outline the procedures for proper collection, retention, use and destruction  Outline Litigation exceptions and response procedures to prevent spoilation  List responsibilities and specific duties  Build a table showing data type and associated procedures and retention periods  Distribute/Educate  Audit

Conclusion  Data retention touches every aspect of your business  Data retention involves every employee of your business  Content should dictate policy  Format should dictate standards and procedures  Develop Policies, Standards and Guidelines then follow them and audit your business for compliance

Thank You Gregory P. Silberman, CISSP Technology Intellectual Property & Outsourcing Group Kaye Scholer LLP Kaye Scholer refers to Kaye Scholer LLP and its affiliates operating in various jurisdictions