An Educational Computer Based Training Program CBTCBT.

Slides:



Advertisements
Similar presentations
FERPA - Sharing Student Information
Advertisements

Cellular Telephone Use Guidelines AA Roundup June 27, 2007.
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Conflict of Interest, Conflict of Commitment, and Outside Activities UTSA HOP 1.33 Non-covered UTSA staff 1.
Introduction to Records Management Policy
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
FERPA Refresher Training Start. Page 2 of 11 Copyright © 2006 Arizona Board of Regents FERPA Refresher Training What is FERPA FERPA stands for Family.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
NAU HIPAA Awareness Training
Voice over the Internet Protocol (VoIP) Technologies… How to Select a Videoconferencing System for Your Agency Based on the Work of Watzlaf, V.M., Fahima,
HIPAA How can you maintain patient privacy and confidentiality? General Medicine LCCA.
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
1 The University of Texas at Tyler Protecting the Confidentiality of Social Security Numbers UTS165 Information Resources Use and Security Policy.
FRAUD DETERRENCE Core Orientation/Core Annual Refresher The following presentation is intended for SCS employees. This presentation will provide a broader.
Data Ownership Responsibilities & Procedures
Financial Data Protection and Consumer Notification of Data Security Breach Act of 2006 Sara Juster, JD Vice President/Corporate Compliance Officer Nebraska.
1 Overview of Ethics Requirements for Employees of Montgomery County This is a summary to help identify issues; it is not the law. Please address ethics.
Uintah School District Acceptable Use for Computer and Network Access.
An Educational Computer Based Training Program CBTCBT.
Employment Forms To begin employment at Wallace Community College and to ensure you will receive your paycheck, complete the forms located on the.
WELCOME Annual Meeting & Compliance Seminar. Code of Conduct - Impact on Corporate Culture by Andy Greenstein Knight Capital Group, Inc.
Internal Control Concepts A Guide for Deans, Directors, and Department Chairs.
An Educational Computer Based Training Program CBTCBT.
VISD Acceptable Use Policy
INTERNET and CODE OF CONDUCT
Fiscal Compliance for Department Heads & Directors Daniel Adams Audit Services.
House Committee on Business and Industry House Bill Implementation of Closed Account Notification System Texas Department of Banking April 22, 2008.
An Educational Computer Based Training Program CBTCBT.
An Educational Computer Based Training Program CBTCBT.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
An Educational Computer Based Training Program CBTCBT.
HIPAA PRIVACY AND SECURITY AWARENESS.
5.02 PowerPoint Objective 5.02 Understand ethics and ethical decision-making.
An Educational Computer Based Training Program CBTCBT.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Objective 5.02 Understand ethics and ethical decision-making.
An Educational Computer Based Training Program CBTCBT.
Confidentiality and Public Information Act LISD Special Education Department Training SY
Training Module 11 – Version 1.1 For Internal Use Only Communication Policy ® Corporate Communications, Disclosure and Insider Trading Policy 
Health Insurance Portability and Accountability Act (HIPAA)
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
FERPA Refresher Training Start. Page 2 of 11 Copyright © 2006 Arizona Board of Regents FERPA Refresher Training What is FERPA FERPA stands for Family.
TAMUCC EPA SECURITY Security Training for Users of Canopy for Creation and Approval of Payroll Documents.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
FAMIS CONFERENCE Mari M. Presley, Assistant General Counsel Florida Department of Education June 12, 2012.
UMBC POLICY ON ESH MANAGEMENT & ENFORCEMENT UMBC Policy #VI
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES 1 The Technical Services Stuff in IT Services A brief tour of the technical and service offering plethora.
Prepared by The Office of the Registrar Youngstown State University February, 2009.
“Kids First, New Mexico Wins!” NMPED Data Conference Spring 2016 Dan Hill General Counsel, Public Education Department Randi Johnson General Counsel, State.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
1 Stewardship, Accountability and Regulatory Compliance October 22, 2015 Stewardship, Accountability and Regulatory Compliance Jim Corkill | Controller.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
UC Riverside Health Training and Development
South Texas College Fraud Awareness and Internal Controls
Multnomah Education Service District
Multnomah Education Service District
Red Flags Rule An Introduction County College of Morris
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Understand ethics and ethical decision-making.
Objective 5.02 Understand ethics and ethical decision-making.
Understand ethics and ethical decision-making.
Protecting Student Data
Presentation transcript:

An Educational Computer Based Training Program CBTCBT

Use of State Property Computers: Security and Use Internet Policy The University of Texas at Tyler General Compliance Training

U.T. Tyler Compliance Program U.T. Tyler’s Compliance Program is intended to demonstrate the absolute commitment of the University to the highest standards of ethics and compliance with all applicable laws, policies, rules, and regulations. Ethical conduct and compliance are personal responsibilities, and each employee will be held accountable for his or her conduct.

Use of State Property General Rule  According to Texas state law, assets owned by U.T. Tyler or any other state entity are to be used for official state purposes only. The personal use of any U.T. asset is prohibited.

Use of State Property What’s OK? Q: Is it ever OK to use any U.T. Tyler asset for personal reasons? A: The occasional, incidental use of certain items, such as and telephones, is OK. But, any use of U.T. resources for personal financial gain is NOT allowed.

Computers: Security & Use  What are the Rules?  What do I have to do?  How do I find out more?

6 Access a computer network or system without proper authorization. 6 Disclose a password, identification code, debit card or bank account number, or any other confidential information about a computer system without the approval of the system operator. 6 Misuse state property to obtain a benefit or cause harm to another person. Computers: Security & Use What are the Rules? According to Section of the Texas Penal Code, state employees, including U.T. Tyler employees, should not:

u It is a violation of Texas state law to disclose computer passwords. u Never tell your passwords to anyone, and do not write or display your password in a place visible to others. Computers: Security & Use What about Passwords?

u Never disclose or make available to others your computer passwords! u Report any breach of security immediately to your supervisor. u When hired, all U.T. Tyler employees must sign a form that they have received, read, and understand the Information Resources Policy. These forms are all maintained locally by your Information Security Officer, Diane Garrett at ext Computers: Security & Use What do I have to do?

Computers: Security & Use How do I find out more? u U.T. System Information Resources Use and Security Policy ml ml u U.T. System, Office of the General Counsel on Ethics and the U.T. System u Section 33.02, Texas Penal Code xts/state1.html xts/state1.html

u U.T. Tyler’s policies regarding computer security and use. u Ask your supervisor or your institution’s designated compliance director. U.T. Tyler’s Compliance Director is Mary Barr at ext Computers: Security & Use How do I find out more? (continued)

Internet Policy u What is it? u What can be posted? u Who has access? u What if I need more information?

Internet Policy What is it? u U.T. institutions u State agencies & the federal government u Other higher education institutions u Foreign entities u Commercial companies The U.T. System Web-site connects employees to information published by:

Internet Policy What can be posted? 4Institutions, and departments within institutions, can publish information on their own sites. 4Examples include general department information, personnel and student directories or listings, and links to related sites.

u Only items which support the mission and goals of the U.T. System may be posted to the U.T. Tyler and other institution’s web-sites. u All employees should talk with their department supervisor to determine who is responsible for maintaining the department’s web-site information. Internet Policy What can be posted? (continued)

u Only U.T. System Administration departments post information directly to the U.T. System web-site. Departments within institutions post information to their institution’s web-site. u Institutions’ web sites can be reached through links on the U.T. System web-site: Internet Policy What can be posted? (Continued) Clarification:

Internet Policy Who has access? But …  Use of the Internet is limited to activities directly related to education, research, institutional, or administrative purposes.  All employees must follow the policies outlined in this training session and available online at

Internet Policy What if I need more information? Get more information at: u U.T. System Administration Internet policy ml ml u U.T. Tyler’s policies regarding Internet use. u Ask your supervisor or your institution’s designated Information Security Officer. U.T. Tyler’s Information Security Officer is Diane Garrett at ext

U.T. Tyler Disciplinary Procedures u Failure to follow compliance guidelines may result in disciplinary action including: departmental counseling, formal disciplinary action, suspension or termination.

Test Your Knowledge Following are several questions to test your knowledge of the information presented. Answer all questions correctly to receive credit for the training.

Question #1 TRUE FALSE The use of state-owned items for personal financial gain is allowed if the business is conducted over the telephone.

REVIEW

Question #2 TRUE FALSE It is a violation of state law to disclose your computer passwords to anyone.

REVIEW

Question #3 Sign a form stating they have received, read, and understand the U.T. information resources policy All U.T. Tyler employees should... Report any breach of password security immediately to his or her supervisor Both of the above

REVIEW

Question #4 All U.T. campus institutions All U.T. campus institutions The U.T. System web site does NOT contain links to... Federal & State agencies Federal & State agencies Popular entertainment web sites Popular entertainment web sites

REVIEW

Question #5 Only information that Only information that supports the mission & supports the mission & goals of U.T. System goals of U.T. System Any information that is Any information that is interesting to the employees interesting to the employees of that department of that department A department of U.T. System Administration can publish on the U.T. System web site...

REVIEW

Question #6 COMPUTER SECURITY AND USE COMPUTER SECURITY AND USE U.T. SYSTEM INTERNET POLICY U.T. SYSTEM INTERNET POLICY BOTH OF THE ABOVE BOTH OF THE ABOVE During the training, references were provided on where to find and who to contact for information on:

REVIEW

Congratulations… you have completed your training on Use of State Property Computers: Security & Use Internet Policy The University of Texas at Tyler General Compliance Training

Use of State Property Computers: Security & Use Internet Policy Hyperlinks... u U.T. System Policy for the Use & Protection of Information Resources u OGC Brief Practical Guide on Ethics m m u Section 33.02, Texas Penal Code tm/pe htm tm/pe htm

The Training Post An Educational Computer Based Training Program CBTCBT