Data Issues: Brent Heads ICT Steering Group 06-03-09 Brent Heads’ ICT Steering Group 06-03-09 Data Issues.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
“ I didn’t know LGfL did that! ” Making the most of your LGfL connection Nick Shea Sales Manager Tel:
George Green’s School Jennifer Surujpaul Head of ICT and E-Learning
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
Departmental drop-in session. The Staff project has three main aims: 1.Provide a standard image for all Windows Machines 2.Consolidate user.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
LGfL Managed Services Brian Durrant Chief Executive London Grid for Learning.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
Network Administration Procedures Tools –Ping –SNMP –Ethereal –Graphs 10 commandments for PC security.
Remote Access SSL VPN Stewart Duncan Technical Manager.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Implementing Unified Messaging Joseph Blanchard Joseph Mancuso S. Paul Petroski.
1 Enabling Secure Internet Access with ISA Server.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
Module 16: Software Maintenance Using Windows Server Update Services.
Barracuda Networks Steve Scheidegger Commercial Account Manager
IT Academy (part of the University of York ). Cybercrime... Fact or CSI SciFi?
New Data Regulation Law 201 CMR TJX Video.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
Your storage on the ground; Your files in the cloud.
Data Security GCSE ICT.
30 th MarchTechnicians Conference th MarchTechnicians Conference 2009 Presentation A Penny Patterson LB Havering.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Chapter 7: Using Windows Servers to Share Information.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Hands-On Microsoft Windows Server 2008
Chapter 9: Novell NetWare
1.1 System Performance Security Module 1 Version 5.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Welcome to MSTC Instructor: Brent Presley. OVERVIEW MSTC Network Login MyMSTC MSTC Computer Needs Software Needs Network Storage Course Website.
The LGfL USO Ian Lehmann Operations Manager. What is USO? Unified Sign On (USO) A term used by LGfL to describe an authentication system where the same.
A T O M W I D E Working with LGfL and its Partners since 2003 Engaging with LGfL, and the 33 London LAs, in support of London schools Working with key.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
MICHAEL J MONROE. What is ? Collection of online services and software offered by Apple. Compatible with Mac OSX, Windows, iPhone, and iPod Touch. Released:
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs This would be presented.
Windows 2000 Ronnie Park Jarod Nozawa Joe Stones Yassir Mhdhroui.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Windows Small Business Server 2003 R2 Powering Small Businesses.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Computer Security Sample security policy Dr Alexei Vernitski.
How To Set Up A Wireless Network. What is a wireless network  A wireless network is a computer network that allows computers and other electronic devices.
ICT Laptops Passwords Encryption Back-ups Data Protection and the Internet Viruses Social Networking / Professional Conduct.
Chapter 7: Using Windows Servers
Basharat Institute of Higher Education
DATA SECURITY FOR MEDICAL RESEARCH
Critical Security Controls
Part 3.
Unit# 5: Internet and Worldwide Web
PLANNING A SECURE BASELINE INSTALLATION
G061 - Network Security.
6. Application Software Security
Presentation transcript:

Data Issues: Brent Heads ICT Steering Group Brent Heads’ ICT Steering Group Data Issues

Data Issues: Brent Heads ICT Steering Group Agenda Introduction Some of the main questions Part 1: Data Security –Some issues –Securing Personal Data Part 2: The Connected Future –Some Issues –Data Sets AOB

Data Issues: Brent Heads ICT Steering Group Some of the Main Questions Why Automated Collection? What is collected and when? Why is it collected by Chesterfield House? Why is it collected by Fronter? Why is it collected by London Grid for Learning(Atom Wide)? What does a school need to do to comply with the Data Protection Act? Why the need for regular school audits?

Data Issues: Brent Heads ICT Steering Group Part 1: Data Security

Data Issues: Brent Heads ICT Steering Group Some issues seen in some schools File servers stored in unlocked offices e.g.. Poor data backup arrangements e.g… Subsets of data available on websites in Excel Subsets of data taken out of school on unencrypted USB Keys Full data sets taken out of school on laptops not password protected or encrypted Remote access to school admin servers via insecure software e.g. PCAnywhere Inaccurate MIS data

Data Issues: Brent Heads ICT Steering Group Data Security - DOs Strictly limit access to personal data to those who need it to do their jobs. Tailor the subset of data which users can see, to that required to do their job. Enforce the use of strong passwords that contain both numbers & capital letters. Enforce regular password changes that do not allow users to reuse old passwords. Regularly review users & rights to ensure that these reflect job needs, that they are current & correct. Do ensure that remote access to the school network is limited & that connections are encrypted. Limit & control the personal data that is taken from the school on portable devices (Memory sticks, PDAs, Laptops etc.) Ensure that all personal data that is taken out of the school is in encrypted form. Ensure that personal & other data is regularly backed up & that a copy is securely stored off-site wherever possible. Ensure that all file servers that contain personal data are in a secure, normally locked location. Ensure that PCs that have regular access to personal data through the logged in user are provided with a password protected screensaver

Data Issues: Brent Heads ICT Steering Group Data Security – DON’Ts Allow remote access to fileservers using products such as PCAnywhere or Microsoft’s Remote Desktop Connection software. Post spreadsheets containing personal data without individual password protection on public facing web sites. Post children’s photos on school websites without ensuring that no personal details are present in the file name or metadata. Do not allow children’s photos to be downloadable from school web sites by right-clicking the image. Allow remote access to file servers from “Any IP Address” without strictly limiting the range ports that are opened.

Data Issues: Brent Heads ICT Steering Group Data Security Audit Where do I start? Carry out a regular data security audit Are you registered with the Information Commissioners Office – is your registration up to date? There is a wealth of information on this site On the audit trail check the dos and don’ts If your registration is not up to date and/or you are not doing a regular audit, and responding to its findings, it is unlikely that you are compliant with the act

Data Issues: Brent Heads ICT Steering Group LGfL Secure and Remote Access –Secure Remote Access costs £60 pa per concurrent user. –Secure Remote Access allows access to school networks for users who want to connect remotely from anywhere within the LGfL network or via the Internet through standard web browser clients. –It is secure and encrypted

Data Issues: Brent Heads ICT Steering Group Securestore – Secure and Remote Storage Secure, encrypted data storage Automated, prescheduled and on demand backups A minimum 1 month backup history Easily upgradeable storage space Quick and simple data restoration Uses existing broadband connection overnight, keeping costs down 50GB + 1 Server licence costs £450pa

Data Issues: Brent Heads ICT Steering Group Part 2: The Connected Future

Data Issues: Brent Heads ICT Steering Group Some Issues MLE Integration SIF Groupcall USO StaffMail LondonMail

Data Issues: Brent Heads ICT Steering Group Data Sharing (1) The Connected Future sees a number of information systems both inside & outside school sharing data. Data security is paramount & systems need to exchange data over an encrypted channel. Data elements need to be in a consistent, standard form & need to be present in Schools’ MIS e.g. MLE integration and various data sets Standardised data exchange protocols are required.

Data Issues: Brent Heads ICT Steering Group Data Sharing (2) The standard defined for data exchange is SIF (Schools [now Systems] Interoperability Framework). This is an Internationally defined standard. SIF products are not yet available. In the interim the Authority has determined that an alternative, called Groupcall Xporter will be deployed to all schools. (See Brent circulars 2270, Nov 2006 & 3457 Jan 2009) available in the Resources area to regularly & automatically collect data.

Data Issues: Brent Heads ICT Steering Group GroupCall Xporter Xporter a small service that runs on the school’s MIS server & is configured centrally. Xporter runs specified MIS reports & transfers the data securely Xporter collects staff and pupil data to keep USO up to date Xporter collects the CTF data set used by the LA Xporter will be superseded in 2010 by SIF

Data Issues: Brent Heads ICT Steering Group Resources enabled by GroupCall Unified Sign-On (USO): A single username and password for every relevant student and member of staff in London, granting access to all supported LGfL resources Second-factor authentication is available using OTP (one time password) tags for services accessing any sensitive data StaffMail: For Staff, Governors and Admin Full Exchange 2007 Functionality Provided ‘free’ to LGfL Schools Replacement to system LondonMail: Web-mail service for curriculum use. Replaces DigitalBrain service Inbound and outbound mail filtering by MicroSoft, protects against viruses, spam and inappropriate content Provided ‘free’ to Brent Schools

Data Issues: Brent Heads ICT Steering Group *Note 1: The CTF data set also contains detail of pupil’s SATs results, their previous school, ethnicity, SEN status, free school meal status, address & attendance information. *Note 2: The SIF data set contains all that is in the CTF data set together with information on staff as well as pupils. Staff information also contains, for example, the National Insurance (NI) number, length of service and grade.

Data Issues: Brent Heads ICT Steering Group Resources Copies of the Consultation version of the Brent Data Security Strategy are now available