RESPONSIBLE SHREDDING Bob Johnson CEO, NAID. Compliant and secure disposition.

Slides:



Advertisements
Similar presentations
1 AUDIT AND AUDIT RESOLUTION Peg Rosenberry, Director of Grants Management Claire Moreno, Audit Liaison, Office of Grants Management 9/18/2009 AMERICORPS.
Advertisements

Fair Credit Reporting Act You must be told if information in your file has been used against you You can find out what is in your file You can dispute.
Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
Red Flag Rules: What they are? & What you need to do
© Chery F. Kendrick & Kendrick Technical Services.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
HIPAA Security Regulations Jean C. Hemphill Ballard Spahr Andrews & Ingersoll, LLP November 30, 2004.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Environmental Management System Bruce Barnard Terry Parish Teresa Woodley.
© Chery F. Kendrick & Kendrick Technical Services.
Security Controls – What Works
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Code of Conduct for Mobile Money Providers 6 November 2014 All material © GSMA The policy advocacy and regulatory work of the GSMA Mobile Money team.
Implementing and Auditing Ethics Programs
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
Electronic Records Management: What Management Needs to Know May 2009.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
THE CLOUD Risks and Benefits from the Business, Legal and Technology Perspective September 11, 2013 KEVIN M. LEVY, ESQ. GUNSTER YOAKLEY.
Destruction Standards & Compliance Presented by: Chris Parker, V.P. Operations Stevens & Stevens Business Records Management, Inc.
2013 NPMA Fall Conference Value Through Professional Asset Management Special Considerations and Best Practices for Hospital & Medical Equipment Bob Mahaney,
DATA PROTECTION IN THE AGO Christina Beusch Deputy Attorney General WA State Attorney General’s Office.
Florida Information Protection Act of 2014 (FIPA).
Managing Credit and Counterparty Risk 1 Marshall Bohbrink VP Risk Management & Treasurer GROWMARK, Inc. November 9, 2009.
R ed F lag R ule Training for the Medical Industry © Chery F. Kendrick & Kendrick Technical Services.
ISO Registration at Sault Ste. Marie WWTP GLRPPR 2002.
TAMUCC EPA SECURITY Security Training for Users of Canopy for Creation and Approval of Payroll Documents.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Webinar for FY 2011 i3 Grantees February 9, 2012 Fiscal Oversight of i3 Grants Erin McHughJames Evans, CPA, CGFM, CGMA Office of Innovation and Improvement.
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
More Sustainable E-waste Management © SERI – Home of the R2 Standard 8/6/15.
Robert J. Scott. Agenda Licensing Models Perpetual vs. Subscription User vs. Device Agreement Types Microsoft Business and Services Agreement Online Subscription.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
Chapter 4: Laws, Regulations, and Compliance
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Alex Ezrakhovich Process Approach for an Integrated Management System Change driven.
 Health Insurance and Accountability Act Cornelius Villalon Jr.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
What is HIPAA? Health Insurance Portability and Accountability Act of HIPAA is a major law primarily concentrating on the prolongation of health.
Mark Kaufmann. Objectives Share and discuss common tips and traps and ways to address Identify strategies for various vendor “ploys” Reality Check Negotiations.
JOHN M. HUFF NAIC PRESIDENT DIRECTOR, MISSOURI DEPARTMENT OF INSURANCE JUNE 16, 2016 NAIC CYBERSECURITY INITIATIVES.
Draft - Enterprise Risk Management Risk Universe
2013 LBA Bank Counsel Conference
Data Destruction Standards & Compliance
Best Practices for Data Security and Protecting Personal Information
CISI – Financial Products, Markets & Services
Florida Information Protection Act of 2014 (FIPA)
Five Universal Requirements of All Data Protection Regulations
Florida Information Protection Act of 2014 (FIPA)
Chapter 3: IRS and FTC Data Security Rules
Procurement Reviews Marty Desautels, Associate Controller
Red Flags Rule An Introduction County College of Morris
Consumer Privacy An Introduction
Safety plan.
County HIPAA Review All Rights Reserved 2002.
Risk Management: why and how to protect your health center
How it affects policies and procedures
Introduction to the PACS Security
Colorado “Protections For Consumer Data Privacy” Law
PERSONALLY IDENTIFIABLE INFORMATION: AUDIT CONSIDERATIONS
Presentation transcript:

RESPONSIBLE SHREDDING Bob Johnson CEO, NAID

Compliant and secure disposition

Information disposal is inevitable!

Compliant and secure disposition Health Insurance Portability and Accountability Act Financial Services Modernization Act Fair and Accurate Credit Transaction Act Regulation SP Health Information Technology for Clinical and Economic Health State-level I.D. fraud prevention laws Data Breach Notification Laws

Regulators are clear about what will keep you out of trouble.

Written policies and procedures Staff training Designated accountability Vendor selection due diligence Service provider contracts required Compliant and secure disposition

Written policies and procedures State organization’s commitment to data protection Define organizational accountability Provide sufficient direction to field staff Describe training and field staff acknowledgement Describe incident reporting protocol Describe auditing methodology and tools Include vendor selection criteria and process

Link to regulatory requirements and written policies/procedure Establish chain of custody and fiduciary clarity Address subcontracting issues Define liability and indemnification requirements Contractual protections

Bob Johnson QUESTIONS?