Personal Information How Not to Share Information And What Information Can be Shared By: Joshua Polson.

Slides:



Advertisements
Similar presentations
FERPA - Sharing Student Information
Advertisements

Protect Our Students Protect Ourselves
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
 Q. Should we keep electronic records  Q. Do you purchase a software package  Q. Do you develop your own package  Q. What solution would be most cost.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
HIPAA Implementation. Basic HIPAA Requirements Designating a Privacy Officer Notifying patients about their privacy rights and how their information can.
NAU HIPAA Awareness Training
Today’s Schools face:  Numerous State and Federal Regulations  Reduced Technology Funding  More Stringent Guidelines for Technology Use.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
CCHAP Practice Manager’s Meeting HIPAA Guidelines and Updates for Primary Care Practices Thursday October 24 th 2013 Noon – 1:00PM Instructions to join.
COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
Gramm-Leach-Bliley Act for Financial Aid Val Meyers Associate Director Michigan State University.
IS3350 Security Issues in Legal Context
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
Security+ Guide to Network Security Fundamentals
Securing Your Networks Personal Safety Rules Apply Here Too. Corporate Identity Theft SPAM.
PRIVACY ACT Federal Workers’ Compensation Conference 2014 Department of Labor.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
4/3/20011 Ethics in Special Education Assessment and Testing and Maintenance of Student Information.
MONEY MANAGEMENT II Credit Reports. What We’re Covering Today What a credit report is and why it’s important Credit bureau basics What is actually on.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Practical Information Management
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
Write True or False for the following questions #1-20
HIPAA PRIVACY AND SECURITY AWARENESS.
2 1.Client protection principles 2.Principle #6 in practice 3.Two components of protecting client data 4.Participant feedback 5.Practitioner lessons and.
STANDARD 5.3 Objective 3 Students will explain and understand the need for confidentiality.
Ames Laboratory Privacy and Personally Identifiable Information (PII) Training Welcome to the Ames Laboratory’s training on Personally Identifiable Information.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
”Billboard that looks back”  What is biometric identification? ◦ Biometrics can be defined as the automated use of physiological or behavioral characteristics.
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
PURGING and ARCHIVING PAPER CHARTS
IM NETWORK MEETING 20 TH JULY, 2010 CONSULTATION WITH 3 RD PARTIES.
Creating Open Data whilst maintaining confidentiality Philip Lowthian, Caroline Tudor Office for National Statistics 1.
Security and Privacy: Panel of Perspectives Rick Skeel University of Oklahoma.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Fundamentals of Human Resource Management, 10/e, DeCenzo/Robbins Chapter 4, slide 1 Chapter 3 Employee Rights and Discipline.
Legal and Ethical Responsibilities. Legal Responsibilities Introduction Criminal law Civil law Tort Malpractice Negligence (continues)
Policy IQ Procedural Requirements Review. Procedural Requirements Policy of Nondiscrimination Identification and Notification of Coordinator(s) Grievance.
By: Rathi Raja Section 1055, 005 About Internet Privacy  Should we have Internet Privacy? Why do we need it? Can having internet privacy help us and.
Market Analysis 1 To ensure success, the entrepreneur needs to understand the industry and the market. He or she should define areas of analysis and conduct.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Any criminal action perpetrated primarily through the use of a computer.
CODE OF CONDUCT TRAINING We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
FERPA Family Educational Rights and Privacy Act of 1974 (also known as the Buckley Amendment)
HIPAA Privacy What Every Staff Member Needs to Know.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Florida Information Protection Act of 2014 (FIPA)
Obligations of Educational Agencies: Parents’ Bill of Rights
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Florida Information Protection Act of 2014 (FIPA)
Chapter 3: IRS and FTC Data Security Rules
Move this to online module slides 11-56
The new data protection rules
Ransomware and Data breaches in public libraries
The Health Insurance Portability and Accountability Act
HIPAA & PHI TRAINING & AWARENESS
Confidentiality.
Good Spirit School Division
What does that have to do with me?
Protecting Student Data
Presentation transcript:

Personal Information How Not to Share Information And What Information Can be Shared By: Joshua Polson

Information Companies Can Share 1)Companies can share information to authorized third parties: A third party can be any outside individual, a business or an association that provides a service to, or acts of behalf of, an institution.A third party can be any outside individual, a business or an association that provides a service to, or acts of behalf of, an institution. 2) Companies can also release the age, sex, religion, material status, other opinions about an individual, and the name of a person.

Shared Information Rights 1.Both the Freedom of Information and Protection of Privacy Act and Municipal Freedom of Information and Protection of Privacy Act require organizations to protect personal information in their safekeeping or jurisdiction. 2.A business that gives out personal information has the right to enter into a written agreement with the third party supplying the service. 3.Personal information considerations are included in businesses policies and procedures.

Abused Information Comes in forms of selling or giving another persons information to a unauthorized third party. An individual purposely not using the correct information on an application. Abused information may lead to Identity Theft, that will result in serious repercussions.

Ways to Protect Your Information 1.Use Passwords on personal computers to limit unwanted access. 2.Use filters on computers to keep hackers out of personal information. 3.Dispose of information correctly. 4.Verify and know who your information is being sent to. 5.Report any breaches to your personal information.

How should Businesses Protect Your Information 1.S tore information on company protected computers. 2.S ecure all paper information in a secure place. 3.G rant limited access to authorized personal only. 4.A udit computer information regularly. 5.D on’t give out information to anyone who's identity can’t be confirmed.

What is Profiling? Profiling is defined as: -n : recording a person's behavior and analyzing psychological characteristics in order to predict or assess their ability in a certain sphere or to identify a particular group of people. Many interesting things can be discovered about a person in profiling like: social security numbers, material status, date of birth, age, occupation, and many other living habits.

The End Remember protect your personal information!!!!! personal information!!!!!