Information Technology & Communications Sensitive Data Use, Storage & Security Meeting Background Data Breach on February 18, 2014 Security Meeting with.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
CONFIDENTIALITY / PRIVACY. Federal Laws Privacy Act of 1974 PII (Personally Identifiable Information)….Protection of social security numbers……….
Data Breach Notification Toolkit Mary Ann Blair Director of Information Security Carnegie Mellon University September 2005 CSG Sponsored by the EDUCAUSE.
P ASSWORD S ECURITY. I F SOMEONE HAS YOUR PASSWORD, EITHER FROM YOU GIVING IT OUT OR THEM FIGURING OUT, THEY COULD : 1.Send abusive or threatening .
IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.
The shadow war: What policymakers need to know about cybersecurity Eric Miller Vice President, Policy, Innovation, and Competitiveness Canadian Council.
Information Security Awareness April 13, Motivation Recent federal and state regulations and guidance Recent federal and state regulations and guidance.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Presented by : Vivian Eberhardt, Supervisor Cash and Credit Operations
Information & Communication Technologies NMSU All About Discovery! Risk-Based Information Security Program at NMSU presented by Norma Grijalva.
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Government Databases and You or How I Learned to Stop Worrying and Love Information Loss. By Patrick Fahey Mis 304.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Data Security At Cornell Steve Schuster. Questions I’d like to Answer ► Why do we care about data security? ► What are our biggest challenges at Cornell?
PERSONAL INFORMATION SWEEP Juliana Luna-Freire, Graduate Assistant David Reamer, Graduate Assistant Justin LeBreck, Applications Systems Analyst.
Information Privacy and Security Quiz! Information Security Office Adapted with permission from the Educause and Internet 2 Information Security Task Force.
Data Security Overview ORSP Staff AT Desktop Service Team November 18th, 2014.
Presenter: Vikash Nath MCP, CCNA, MCTS. On-Premise Private Cloud Public Cloud Hybrid Cloud.
Data Governance Data Architecture Data Development Database Operations Data Security Management Referene & MDM DW & BI Document & Content Mgmt Meta.
Information Resources and Communications University of California, Office of the President System-Wide Strategies for Achieving IT Security at the University.
Case Study - Scenario 1 Austin School is one of six high schools catering for students aged between 11 and 16 years of age. Parents can select any one.
Introduction to the Pika Case Management System Aaron Worley Tuesday February 3, 2003.
PCI requirements in business language What can happen with the cardholder data?
Data Risk and Security Andrew Roderick Campus Technology Committee – January 21, 2015.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
Florida Information Protection Act of 2014 (FIPA).
Protecting Personal Information at Fermilab. What You Will Learn F Why must we protect personal information? F What are the laboratory policies governing.
General Awareness Training Security Awareness Module 3 Take Action! Where To Go for Help.
Cyber Security & Fraud – The impact on small businesses.
Greater Toronto Hockey League The Implementation of PIPEDA and Amateur Sports – A Case Study.
Data Security Project PROJECT WRAP-UP Timeline – July 2011 through December 2012 Project Charge – Compile resources and best practices for the proper handling.
ICT development office ICT research, planning and training dept. Network development and administration dept. System development and operation dept. President.
Cyber Security Awareness Month Using Your Laptop Safely On the Road Off-Campus Safe Computing Part 2.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Data Breach: How to Get Your Campus on the Front Page of the Chronicle?
{ Cloud computing. Exciting and relatively new technologies allow computing to be a part of our everyday lives. Cloud computing allows users to save their.
What you need to know about PCI-DSS Jane Drews Chief Information Security Officer Information Security & Policy Office
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
Creating and Managing Networks CSC February, 1999.
1 ITS STRATEGIC INITIATIVES Ken Orgill Assistant Vice Chancellor, Information Technology Services and Campus Chief Information Officer.
IDENTITY FINDER TRAINING. What is Identity Finder?  Identity Finder is a program that is installed on your desktop, laptop, or server to locate personally.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
What lessons can we learn from other data breaches? Target Sentry Insurance Dynacare Laboratories 1 INTRODUCTION.
Data Security and the Internet Xiaohui Zhang University of the Fraser Valley.
Cloud Computing HOW PROFITABLY CLOUD COMPUTING IS TO YOUR BUSINESS?
University of California Cloud Computing Task Force Russ Hobby.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
March 23, 2015 Missouri Public Service Commission | Jefferson City, MO.
North Dakota’s Cybersecurity Task Force Panel March 17, 2016 #NDCyberSecurity2016.
JOHN M. HUFF NAIC PRESIDENT DIRECTOR, MISSOURI DEPARTMENT OF INSURANCE JUNE 16, 2016 NAIC CYBERSECURITY INITIATIVES.
Identity Finder Client
Membership Updates.
EDUCAUSE/Internet2 Computer & Network Security Task Force
Information Security Program
DART Technology Nicole Fontayne-Bardowell, MPA Vice President & CIO
Florida Information Protection Act of 2014 (FIPA)
Protecting Personal Information at Fermilab
Florida Information Protection Act of 2014 (FIPA)
QuickBooks Cloud Hosting Support Number
Payment Card Industry Data Security Compliance
PNC Bank Student Banking
CLOUD COMPUTING SECURITY
Personnel Training for Privacy
Technology Department Annual Update
Technology Solutions Cybersecurity Report to the KCTCS Board of Regents March 14, 2019.
For the MVHS Cyber Defense CLub
State & Federal Legislative Update
Fy ‘08 NETWORK PLANNING TASK FORCE
Presentation transcript:

Information Technology & Communications Sensitive Data Use, Storage & Security Meeting Background Data Breach on February 18, 2014 Security Meeting with CMNS IT staff March 12 Presidents Task Force on Cybersecurity 1. Identify Sensitive Information In University Databases 2. Determine If The Information Should Be Retained, And, 3. If Necessary, To Make Recommendations On How To Better Protect Those Data Old Policy

Information Technology & Communications Sensitive Data Use, Storage & Security Meeting Why Where Here… From Ann G. Wylie Interim Vice President and Chief Information Officer Chair, President’s Task Force on Cyber Security Each Unit Will Examine Their Systems, Applications, Websites And Databases Report On The Data Utilized By Each ***Include Systems That Are Hosted On The Campus Network As Well As Those Hosted Off Campus “In The Cloud” Or On Local Servers.

Information Technology & Communications Sensitive Data Use, Storage & Security Meeting What We Need To Understand and Report How Does ESSIC Use And Store Sensitive Information Currently Sensitive Information Social Security Number Drivers License Number Passport Information Visa Information Bank Account Information Credit Card Information Other