Copyright© 2010 WeComply, Inc. All rights reserved. 10/13/2015 Information Security.

Slides:



Advertisements
Similar presentations
Protect Our Students Protect Ourselves
Advertisements

Northside I.S.D. Acceptable Use Policy
Privacy and Information Security Training ( ) VUMC Privacy Website
System Security & Patient Confidentiality General Lesson 1.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
LMC WHAT IS HIPAA AND HOW TO COMPLY WITH IT? Health Insurance Portability and Accountability Act of 1996.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Security Training Lunch ‘n Learn. Agenda  Threat Analysis  Legal Issues  Threat Mitigation  User Security  Mobile Security  Policy Enforcement.
Online Course START Click to begin… Module 2 General Information Security.
Critical Data Management Indiana University HR Summit April 24, 2014.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Policy 6460 Staff Use of Computerized Information Resources Regulation 6460 R-Staff Use of Computerized Information Resources Regulation 6460 R.2 Staff.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Copyright© 2011 WeComply, Inc. All rights reserved. 5/17/2015 FERC Standards of Conduct.
Security, Privacy, and Ethics Online Computer Crimes.
Information Security Awareness:
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
INTERNET and CODE OF CONDUCT
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
1.0 Computer Lab Regulations 1.1 Computer Lab Rules 1.2 User 1.3 Equipment 1.4 Data and User Security.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
HIPAA Privacy & Security EVMS Health Services 2004 Training.
Protecting Sensitive Information PA Turnpike Commission.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Program Objective Security Basics
IT Security for Users By Matthew Moody.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Copyright© 2010 WeComply, Inc. All rights reserved. 9/19/2015 Record Management.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Copyright© 2010 WeComply, Inc. All rights reserved. 10/10/2015 FACTA Red Flags.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Copyright© 2010 WeComply, Inc. All rights reserved. 10/17/2015 Internal Controls.
October 20, 2015 Copyright © 2010 WeComply, Inc. All rights reserved. Questionable Interview Questions Note to Trainer.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Information Security Office Protecting Privacy in the New Millennium © Copyright Melissa Guenther, LLC. All rights reserved. Kelley Bogart – Information.
Copyright© 2010 WeComply, Inc. All rights reserved. 11/12/2015 Conflicts of Interest.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
December 25, 2015 Copyright © 2010 WeComply, Inc. All rights reserved. Appropriate Internet Use Note to Trainer.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Cyber Safety Jamie Salazar.
Security and Ethics Safeguards and Codes of Conduct.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
Final HIPAA Rule Special Training What you need to know to remain compliant with the new regulations.
Technological Awareness for Teens and Young Adults.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
Netiquette internet manners, online etiquette, and digital etiquette The social code of network communication The social and moral code of the internet.
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Health Insurance Portability and Accountability Act (HIPAA) Primer for Observers, Volunteers, Medical Students Dr. Michael Palumbo- Privacy Officer/ EVP.
ISMS Information Security Management System
Protect Our Students Protect Ourselves
HIPAA Privacy and Security
Protecting PHI & PII 12/30/2017 6:45 AM
WHAT IS HIPAA AND HOW TO COMPLY WITH IT?
HIPAA Online Student Orientation
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
WHAT IS HIPAA AND HOW TO COMPLY WITH IT?
Faculty of Science IT Department By Raz Dara MA.
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Premier Employee Program Version 4.0
School of Medicine Orientation Information Security Training
Presentation transcript:

Copyright© 2010 WeComply, Inc. All rights reserved. 10/13/2015 Information Security

Copyright© 2010 WeComply, Inc. All rights reserved. 10/13/2015 Information Security

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/20103 Overview Information Security We must meet strict confidentiality standards for certain information We must safeguard business/confidential information we deal with day-to-day Policy is intended to help us protect information we deal with, handle it responsibly and keep it confidential Policy is based on — Prudent and responsible business practices Contractual obligations Laws and regulations

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/20104 Electronic ID and Passwords Confidential information must remain secure at all times Access to confidential information is granted on "need- to-know“ basis You have level of access needed to perform your job duties User ID/password is your electronic identity Protect your password at all times — even from your co-workers Lost/stolen password can compromise confidentiality and lead to identity theft

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/20105 Pop Quiz! Roz hates to think of passwords and makes her latest password "u9gi'y/8o" by just letting her fingers glide over the keyboard randomly. Is this password strong or weak? A.Strong. B.Weak.

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/20106 Avoiding Identity Theft To avoid identity theft — Memorize passwords — don't write them down Use password that is not immediately associated with you Make password hard to crack Never let anyone "borrow" your password People who use your password to access organization’s information are intruders who should be reported to your supervisor or IT Department

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/20107 Avoiding Identity Theft (cont’d) To avoid identity theft — Memorize passwords — don't write them down Use password that is not immediately associated with you Make password hard to crack Never let anyone "borrow" your password People who use your password to access Company information are intruders who should be reported to your supervisor or IT Department

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/20108 Information Classification Information is divided into four classes: Restricted — e.g., passwords Confidential — protected health information; personal, confidential and business-confidential information Internal — personal and business information for internal use only Public Restricted and confidential information must be encrypted. Confidential information must not be left unattended on fax machines, desktops or computer screens. Business confidential information must not be disclosed to anyone who has not signed a nondisclosure agreement

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/20109 Special Note…

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ Computer Viruses and Hoaxes Computer viruses, worms and Trojan horses can damage our information assets Contact IT Department immediately if you think your computer is infected Malicious code infects computer networks through — attachments CD-ROMs or other storage media Downloads from the Internet Hoaxes — messages that warn of virus/worm that doesn't really exist — should not be forwarded

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ Computer Viruses and Hoaxes (cont’d) Computer viruses, worms and Trojan horses can damage our information assets Contact IT Department immediately if you think your computer is infected Malicious code infects computer networks through — attachments CD-ROMs or other storage media Downloads from the Internet Hoaxes — messages that warn of virus/worm that doesn't really exist — should not be forwarded

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ Using Our E-Communication Systems Our e-communication systems are to be used primarily for conducting Company business You should have no expectation of privacy when using them Activities prohibited on our e-communication systems: Pornography, obscene material or offensive language Excessive personal use Inappropriate comments about characteristics protected by law Material that would reflect poorly on the Company Other content that violates any law or regulation

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ Extra Precautions Keep these precautions in mind: Spam — delete junk-mail received your work account Questionable attachments — be careful about opening attachments unless you know sender and contents of attachment

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ Workspace Security Workspace-security tips: Beware of "Tailgaters" in Secure Facilities Don't hold a door open for strangers Report incidents of unauthorized entry to security Protect Your Work Area Secure all media containing confidential information when not in use Shred confidential/sensitive information that you need to dispose of Use screensavers with passwords Lock your computer when you are away from it

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ In the news…

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ Social Engineering There are many low-tech ways — called social engineering — used to gain unauthorized access to confidential information: Impersonating an authorized person online, by phone or even in person Coaxing information out of employees by preying on their trust, charming them or flirting Rigging the system, offering to "fix it," then accessing passwords in the course of repairing it Entering work area and looking over people's shoulders to see passwords Sifting through unshredded documents in trash

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ Pop Quiz! Sean took some work home with him. He decided to clean out his briefcase and dispose of some old memos and an out dated employee phone list in the recycling bin behind his apartment building. Sean didn't bother shredding any of the old paperwork because he was sure it contained no confidential information. Were there any security concerns here? A.No, if he was sure that the documents contained no confidential information. B.Yes, because the information could be useful to hackers. C.Maybe, if the documents contained information that was not totally out of date.

Copyright© 2010 WeComply, Inc. All rights reserved. 8/11/ Business Continuity Plans Business Continuity Plans are designed to prevent or reduce downtime in event of catastrophe You are responsible for — Reviewing/understanding your department's BCP and making necessary preparations Backing up and storing information assets in authorized manner Knowing location of fire exits and escape routes Having alternate method of coming to work

Copyright© 2010 WeComply, Inc. All rights reserved. 10/13/2015 Final Quiz

Copyright© 2010 WeComply, Inc. All rights reserved. 10/13/2015 Questions?

Copyright© 2010 WeComply, Inc. All rights reserved. 10/13/2015 Thank you for participating! This course and the related materials were developed by WeComply, Inc. and the Association of Corporate Counsel.