EMAIL ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.

Slides:



Advertisements
Similar presentations
Data Privacy and Security in the Cloud Presented by Robert J. Scott Managing Partner Scott & Scott, LLP
Advertisements

Department of Information Systems Brigham and Womens Hospital Laptop Encryption Catherine McGoldrick Schroeder Corp. Mgr, BWH IS Management & Planning.
A Guide to Compliant Data Management
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
Changes to HIPAA (as they pertain to records management) Health Information Technology for Economic Clinical Health Act (HITECH) – federal regulation included.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Regulations What do you need to know?.
Springfield Technical Community College Security Awareness Training.
© 2014 Nelson Brown Hamilton & Krekstein LLC. All Rights Reserved PRIVACY & DATA SECURITY: A LEGAL FRAMEWORK MOLLY LANG, PARTNER, NELSON BROWN & CO.
Peeling Back the Layers of an Ogre (or for those who like boring titles – Where is Our Confidential Data Hiding?) Harvard Townsend IT Security Officer.
Financial Data Protection and Consumer Notification of Data Security Breach Act of 2006 Sara Juster, JD Vice President/Corporate Compliance Officer Nebraska.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Dino Tsibouris (614) Information Security – What’s New In the Law?
Developing a Records & Information Retention & Disposition Program:
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Data Security At Cornell Steve Schuster. Questions I’d like to Answer ► Why do we care about data security? ► What are our biggest challenges at Cornell?
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
IT Security Challenges In Higher Education Steve Schuster Cornell University.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
Protecting Sensitive Information PA Turnpike Commission.
Milada R. Goturi Tonya M. Oliver Thompson Coburn LLP 1.
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
HIPAA PRIVACY AND SECURITY AWARENESS.
Wireless Password:  “The cloud” is real  Electronic data growth is rapid and pervasive  Employees use the cloud to conduct government work.
Quality Integrity Stewardship Courtesy Care Accountability Medical Records ARMA Florida Gulf Coast Chapter Michael Spake Lakeland Regional Medical Center.
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
AUGUST 25, 2015 Cyber Insurance:
Security considerations for mobile devices in GoRTT
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
SPH Information Security Update September 10, 2010.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
Imagine a health system that focuses on health, not just health care. Imagine a sustainable health system with one goal: to improve the lives of the people.
Configuring Electronic Health Records Privacy and Security in the US Lecture c This material (Comp11_Unit7c) was developed by Oregon Health & Science University.
Managing your Institution-Specific HIPAA Compliance Policies and Procedures Cutting Edge Issues Thursday, December 13, 2007.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Western Asset Protection
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
Data Security and Privacy Overview and Update Peter Moldave October 28, 2015.
Chapter 4: Laws, Regulations, and Compliance
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Privacy and Security Considerations in Research and Clinical Trials February 28, 2013 Joanna K. Napp, J.D., M.P.H. Chief Privacy Officer and Compliance.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Pioneers in secure data storage devices. Users have become more accustomed to using multiple devices, are increasingly mobile, and are now used to storing.
Protecting PHI & PII 12/30/2017 6:45 AM
Regulatory Compliance
HIPAA.
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Colorado “Protections For Consumer Data Privacy” Law
School of Medicine Orientation Information Security Training
Presentation transcript:

ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon

Statistics about Use 247 billion s are sent each day. That’s one every seconds. In the time it takes you to read this sentence, some 20 million s entered cyberspace. Corporate accounts will grow on average of 25% every year for next 5 years. Daily business traffic per day will grow on average 13% every year for next 5 years. 96% of employees believe their companies face some level of legal risk associated with poor management. 69% believe employees ignore policies about ing unencrypted confidential information through insecure channels.

Federal Industry Regulations The Gramm-Leach-Bliley Act (GLBA) Protects consumers’ personal financial information held by financial institutions. Mandates financial institutions should use encryption to mitigate the use of disclosure or alteration of sensitive information in storage and transit.

Federal Industry Regulations Family Educational Rights and Privacy Act (FERPA) Protects the privacy of student education records. The law applies to all schools that receive funds under an applicable program of the U.S. Department of Education. Encrypt all confidential, non-directory, and sensitive personal information. Encryption is required for all such information that is saved on portable computing devices such as thumb drives and laptop computers; encryption is highly recommended for other devices as well.

Federal Industry Regulations The Health Information Technology for Economic and Clinical Health (HITECH) Act Strengthens HIPAA, and increases fines of up to $1.5 million – a considerable increase from the previous $25,000 fine. If a breach occurs, business are required to provide notification of the breach to affected individuals and the HHS (Health and Human Services) Secretary. If a breach affects 500 individuals or more, the breach is published on the OCR (Office for Civil Rights) breach list and media outlets serving the affected individuals’ state or jurisdiction must be notified.

State Regulations Massachusetts Under Mass 201 CMS 179, Massachusetts requires companies to encrypt all personal information of state residents transmitted electronically or wirelessly. Nevada NRS 603A10 passed in October 2008 and mandates that all businesses, no matter how small or what they do, must secure confidential customer information if it is sent electronically. Statute 603A.215 states that any form of Internet communication must encrypt personal data.

State Regulations Washington Passed in January 2008, HB protects personal information that is managed by any person or organization that conducts business in the state. If personal information — including name combined with Social Security number, driver’s license number, financial account information — is transmitted or stored on the internet, the law requires it to be secured and deems encryption as the accepted practice.

Encryption-Company X Company X requirements: Company X is a mid size company in a food industry, with 300 employees that has customer presence in all states and Internationally Communicates externally with remote employees, customers, business partners, consultants and regulatory entities using on daily basis Required under federal regulation to use encryption to mitigate the use of disclosure or alteration of sensitive information in storage and transit

Requirements for Company X Current Risks & Challenges for Company X: Based on the recent survey conducted at the Company X, following risk were identified: Company X is not compliant under Federal regulation of HIPAA Act which could risk company with financial liability and company reputation Mobility - a new risk on the rise users spend an average of 42 percent of their mobile time using . With increasing dependence on mobile devices for access to data whenever, wherever, mobile is a major concern

Questions ?