Secure Messaging The Importance of Privacy Presented by Maine ARES Prepared By Bryce Rumery, K1GAX Maine ARES Section Emergency Coordinator.

Slides:



Advertisements
Similar presentations
Amateur Radio Technician Class Element 2 Course Presentation
Advertisements

Amateur Radio Technician Class Element 2 Course Presentation
Amateur Radio Technician Class Element 2 Course Presentation ELEMENT 2 SUBELEMENTS T1 - FCC Rules, station license responsibilities T2 - Control operator.
How to protect yourself, your computer, and others on the internet
Northside I.S.D. Acceptable Use Policy
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Hart District Acceptable Use Policy Acceptable Use Policy.
Onslow County Schools Division of Media and Instructional Technology This presentation was prepared under fair use exemption of the U.S. Copyright Law.
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
INTRODUCTION TO PUBLIC DISCLOSURE RESPONSE Paula Adams, King County Public Disclosure Officer.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Using Technology the CCSD Way by Dr. Kathi Vanderbilt.
Technician License Course Chapter 8 Lesson Module 19: Operating Regulations: Interference; Remote & Automatic Operation; Prohibited Transmissions.
Technician Licensing Class Mind the Rules Section 4.
Communications and Documentation: Chapter 9. Communications and Documentation Essential components of prehospital care: – Verbal communications are vital.
CIVIL & CRIMINAL LIABILITY Staff Development Emergency Operations Volunteer Training Legal Issues:
T5-1 Chapter 6 – Operating Regulations Control Operators Identification Interference Third-party Communications Remote and Automatic Operation Prohibited.
Information Security Policies Larry Conrad September 29, 2009.
Fire and Emergency Services Company Officer — Lesson 18 Fire and Emergency Services Company Officer, 4 th Edition Chapter 18 —Incident Scene Communications.
ICAICT202A - Work and communicate effectively in an IT environment
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
David Coursey, N5FDL EC, San Joaquin County ARES
What is Amateur Radio and what can it do for you?.
State of Texas NOTARY PUBLIC REGULATIONS “TEST YOUR NOTARY SKILLS- WHAT YOU KNOW FACT OR FICTION” Brought to you by TERESA FROST Texas Agency Manager.
HIPAA PRIVACY AND SECURITY AWARENESS.
Ashley Counce. What is Cyber Bullying?  Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition,
ESCCO Data Security Training David Dixon September 2014.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Telecommunications Chapter 12 ICBS 120. Telephone Personality n First impressions conveyed through verbal and nonverbal communication. n Personality and.
Technician License Course Chapter 8 Lesson Module 19: Operating Regulations: Interference; Remote & Automatic Operation; Prohibited Transmissions.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
The Amateur Radio Policy Committee. What is ARPC?  A group of three Hams who filed a petition regarding (a)(3).  Tom Blackwell, N5GAR – Former.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
Emergency Communications. Ham radio operators are uniquely set up to provide emergency and public service communications. Radio Amateur Civil Emergency.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Preparing Your AmeriCorps Team For Disaster: Understanding COOP De Flounlacker Consultant, DPE.
Public Service Events The Chance to Hone Our Emergency Communications Skills and Serve the Community Developed by Bryce Rumery, K1GAX Maine ARES Section.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Professionalism/Customer Service in the Health Environment Communications and Professionalism This material Comp16_Unit9 was developed by The University.
Technician License Course Chapter 8 Lesson Module 18: Operating Regulations: Control Operators; Station Identification; Third-Party Communications.
“Compliance and You” This presentation is for Producer use only.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Component 16- Professionalism/Customer Service in the Health Environment Unit 9- Personal Communications and Professionalism This material was developed.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
CHAPTER 19 Communication Skills.
SOUTHWESTERN ALABAMA ARES GROUP EMERGENCY COMMUNICATIONS TRAINING.
Prefix Number Suffix  1 or 2 letter prefix, W, K, N, A_  Number from 0 _ 9  1, 2, or 3 letter suffix depending on class or special purpose. Assigned.
When Can You Redact Information Without Requesting an Attorney General Decision? Karen Hattaway Assistant Attorney General Open Records Division Views.
Know Before You Go The things you need to know before you deploy Prepared by Bryce Rumery, K1GAX Maine ARES Section Emergency Coordinator Maine ARES.
Mass Media Law 18 th Edition Don Pember Clay Calvert Chapter 15 Regulation of Advertising McGraw-Hill/Irwin © 2013 McGraw-Hill Companies. All Rights Reserved.
Rules and Regulations. Most Important Information Control Operator Responsibilities. –The FCC’s primary concern is that transmissions are made only under.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
AREA REP SUPPORT SKILLS A. 2 This is intended as beginning training only. It is assumed that all Area Reps will continue with Support Skills B, as well.
TASFAA 2016 Legacy of Leadership. TASFAA 2016 Legacy of Leadership Family Educational Rights and Privacy Act (FERPA) An Overview Molly Thompson Associate.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Fraud Protection.
David Coursey, N5FDL EC, San Joaquin County ARES
Fraud protection.
Pre-Departure Health & Safety Presentation
Introduction to ONE Mail
With which countries are FCC-licensed amateur radio stations prohibited from exchanging communications? A. Any country whose administration has notified.
Operating Regulations
Technician License Course.
Developing an Emergency Communications Plan
Operating Regulations American Radio Relay League
Presentation transcript:

Secure Messaging The Importance of Privacy Presented by Maine ARES Prepared By Bryce Rumery, K1GAX Maine ARES Section Emergency Coordinator

Secure Messaging First and foremost; First and foremost; –There is no mode of amateur radio that is secure  Per Part 97 ( Prohibited Transmissions (a,4)) –Music using a phone emission except as specifically provided elsewhere in this Section; communications intended to facilitate a criminal act; messages in codes or ciphers intended to obscure the meaning thereof, except as otherwise provided herein; obscene or indecent words or language; or false or deceptive messages, signals or identification –Amateur radio should never be used to transmit messages that contain sensitive information

Some amateurs believe that some modes of amateur radio are quasi-secure Some amateurs believe that some modes of amateur radio are quasi-secure –Such as  Digital Modes  CW –These modes can be easily intercepted with a moderate expense Secure Messaging

What is sensitive information? What is sensitive information? –Information that if improperly released could be reasonably expected to have a negative impact on a person or institution

Some examples of sensitive information Some examples of sensitive information –Social Security Numbers –Credit Card Numbers/Bank Account Numbers –Medical Information –Casualty Information –Prescription Information –A Person’s Name and Address –Family Information –Financial Information –User Names/Passwords Secure Messaging

What is the impact of improper release of sensitive information What is the impact of improper release of sensitive information –Persons or institutions may be embarrassed –Persons or institutions may be negatively impacted for a substantial period of time –The costs of correcting the improper release of the information may be staggering Secure Messaging

Consequences of transmitting sensitive information over non-secure means Consequences of transmitting sensitive information over non-secure means –Sender can be held  Criminally responsible –Under State and Federal Statutes  Civilly responsible –Can face civil lawsuits and liable to civil judgments Secure Messaging

Who can be held responsible Who can be held responsible –The originator of the message  The organization  The actual message originator –The transmitter of the information Secure Messaging

What are insecure transmission means What are insecure transmission means –Any communications method that may be easily intercepted by the general public  Such as –Amateur radio –Non-secure radio –Analog cell phone Secure Messaging

What are secure means of transmission What are secure means of transmission –Telephone –Fax –Digital Cell Phone –Encrypted –Encrypted Radio –Courier Secure Messaging

Understand that Understand that –During a disaster, many disaster relief volunteers often do not understand  What sensitive information entails  That amateur radio is not a secure means of communication –They probably know nothing about amateur radio Secure Messaging

Understand that Understand that –The general public usually knows little or nothing about amateur radio  They may ask you to transmit sensitive information on their behalf Secure Messaging

Mechanisms must be in place to avoid the release of sensitive information over non- secure communications means at all levels Mechanisms must be in place to avoid the release of sensitive information over non- secure communications means at all levels –Organizations must be aware and watchful –Message originators must be aware and avoid the release –Message senders must be mindful of sensitive information Secure Messaging

If possible, find out what policies and procedures a served agency has in place regarding the protection of sensitive information before actually responding to a disaster. If possible, find out what policies and procedures a served agency has in place regarding the protection of sensitive information before actually responding to a disaster. –For example  The American Red Cross prohibits the transmission of shelter resident lists over non-secure communications means Secure Messaging

Ask during a pre-deployment briefing what the policies are. Insist on getting them before you deploy. Ask during a pre-deployment briefing what the policies are. Insist on getting them before you deploy. Secure Messaging

It is wise for us to practice the concept of COMSEC. It is wise for us to practice the concept of COMSEC. –COMSEC is a military term –COMSEC stands for Communications Security –COMSEC is the avoidance of the release of potentially damaging information via non- secure communications means –COMSEC can be easily applied to the release of sensitive information over non-secure means in the civilian world Secure Messaging

–Be sure to think COMSEC in all of your communications –Practice COMSEC no matter what your message might be Secure Messaging

How can the amateur radio operator protect him or herself from the improper release of sensitive information How can the amateur radio operator protect him or herself from the improper release of sensitive information –Read each message before transmitting it –Identify sensitive information that may be contained in the message  When in doubt, consider something sensitive information –Bring it to the attention of the message originator Secure Messaging

When returning a message to the message originator When returning a message to the message originator –Be diplomatic –Identify the sensitive information –Remind the originator that amateur radio is never secure –Ask the message originator to use a secure means of communications  Help them identify a secure means of communications, if necessary Secure Messaging

If the message originator insists you transmit the sensitive information via a non-secure means If the message originator insists you transmit the sensitive information via a non-secure means –Protect yourself  Have the message originator sign a release form –Releasing you from responsibility and liability –The message originator acknowledges they are aware that the message contains sensitive information –The message originator understands that amateur radio is a non-secure means of communications –The message originator takes full responsibility for the message content –The message originator directs you to send the message Secure Messaging

If the message originator insists you transmit the sensitive information via a non-secure means If the message originator insists you transmit the sensitive information via a non-secure means –Always have release forms with you –Be sure to get everything in writing  Do not expect the message originator to back you up if they could be expected to get in trouble –Most of the time they will protect themselves before protecting you Secure Messaging

If the message originator insists you transmit the sensitive information via a non-secure means If the message originator insists you transmit the sensitive information via a non-secure means –If the message originator refuses to sign the release form, simply refuse to send the message –Document your action Secure Messaging

In summary In summary –Be aware of sensitive information –When in doubt, air on the side of caution –Practice COMSEC –Never transmit sensitive information over non-secure communications channels –Always get everything in writing Secure Messaging

When in doubt, always protect yourself Presented by Maine ARES Secure Messaging