Cyber Security Training Assessment for Indian Army Cyber security for Social Networking 18 February 2015 Command HQ complex, Delhi Cantt.

Slides:



Advertisements
Similar presentations
Information for Students MGH Institute of Health Professions Use your down arrow or click your mouse to advance through the presentation.
Advertisements

1 Overview for DAP Business Units Digital Archives Problem Statement Records are all material "regardless of physical form, created or received in connection.
Living with HIV Know Your Rights Disclosure in school and daycare The information contained in this publication is information about the law, but it is.
HIPAA Implementation. Basic HIPAA Requirements Designating a Privacy Officer Notifying patients about their privacy rights and how their information can.
CALEA Compliance in 2006 H. Michael Warren Vice President, Fiduciary Services NeuStar, Inc February 2006.
Donna Monk MAPPA Co-ordinator.  Understand the purpose and function of MAPPA  Understand the language and terminology of MAPPA  Explore the framework.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Ministry of Culture of the Republic of Macedonia – Cultural Heritage Protection Office.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Data Management Awareness January 23, University of Michigan Administrative Information Services Data Management Awareness Unit Liaisons January.
NDSU RECORDS MANAGEMENT INITIATIVE 2007
IT Security Challenges In Higher Education Steve Schuster Cornell University.
NDSU RECORDS MANAGEMENT INITIATIVE December 2007 PowerPoint.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
SOCIAL MEDIA AND SCHOOL DISTRICTS By Jill Coyle ISD 196.
Retention and Disposition. Are messages public records? At NMU, all messages composed and maintained on University hardware are considered.
© 2010 Dorsey & Whitney LLP Social Media Friday, September 17, 2010 The Committee on Finance & Information Technology (CFIT)
A User's Guide to Data Security and Control Copyright © 2010 Virya Technologies A Basic Guide to the Importance of Data Security and Control.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil March 20, 2015 UNCLASSIFIED Industrial Security.
Credit unions use social media in a variety of ways, including marketing, providing incentives, facilitating applications for new accounts, inviting feedback.
Records Managers’ Forum 28 February Draft standard on the appraisal and disposal of State records Catherine Robinson Senior Project Officer, Government.
Designing Smart Cities Conference University of Strathclyde, Glasgow 31 st March 2015 “Regulating Smart Cities: Policing & Privacy” Paul Mackie Chief Executive.
Security and Privacy Strategic Global Partners, LLC.
Public Records Earl C. Rich, CRM. We’re Gonna Talk About: Definition of a public record State policy on public access Management of public records Managing.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Student Confidentiality: The FERPA/HIPAA Facts AISD Policy Student Records AISD Procedure AP. 11.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
Keeping you Running Part II Developing Your Own Local Government Cyber Security Plans Stan France & Mary Ball
Florida Division of Emergency Management – March 2002Unit III- State of Florida Requirements and the Essential Elements of a Viable COOP Program UNIT III.
OPTIONS FOR ACTION – BLUEPRINT FOR ACTION. Executive (CEO) Engagement MAKING THE BUSINESS CASE Legal mandates Liability Employee engagement Corporate.
Presidential Memorandum on Managing Government Records Paul Wester Chief Records Officer for the U.S. Government National Archives and Records Administration.
Social Networking as a Training Tool Cincinnati-Hamilton County Homeland Security.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
HIPAA BASIC TRAINING MODULE 1C – Overview (For staff who do not generally create Protected Health Information) Anderson Health Information Systems, Inc.
Incoming communication Diagram A0 Carry out business activity 2 Outgoing communication Manage records 3 Result, deliverable Mandate External requests.
Twelve Guiding Principles for the Regulation of Surveillance Camera Systems Presented by: Alastair Thomas Date: 23 rd October 2013.
1 Role of the Data Protection Officer Donald Henderson Information Compliance Manager 30 September 2010.
Privacy Act United States Army (Managerial Training)
A New Standard for Disposal Mark Crookston Senior Advisor Appraisal Government Recordkeeping Group.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
Computer Policy and Security Report to Faculty Council Jeanne Smythe ATN Director for Computing Policy March 26,2004.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
Operational Issues. Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees,
Policy, Standards and Guidelines Breakout Co-Chairs Victor Hazlewood OCIO Cyber Security, ORNL Kim Milford ISO, University of Rochester.
Making Innovation Sustainable: The Axios Experience in Tanzania Anne V. Reeler, PhD Chief Technical Officer, Axios.
Information Security tools for records managers Frank Rankin.
JOHN MARSHALL COMMUNITY SCHOOL Media Center Mrs. Shepard Updated 2/8/14.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Life circumstances and service delivery Community survey Finalise pilot survey (June 2006) List of dwellings completed (September 2006) Processes, systems.
McLean HIGHER COMPUTER NETWORKING Lesson 10 Ethical Implications Description of ethical implications of networks: Personal privacy Censorhip.
Accountability & Structured Privacy Management
Mirjana Boshnjak Skopje, 20 to 22 September 2017
Data Security and Privacy Overview: NJDOE’s Approach to Cybersecurity
Data Minimization Framework
Protection of CONSUMER information
Microsoft 365 Get help with regulatory compliance
Decrypting Data Compliance in China
Student Confidentiality: The FERPA/HIPAA Facts
Records Management New policies and procedures
Introducing GDPR: How the General Data Protection Regulation transforms the world Laura Mudd November 2016.
FOIA, Privacy & Records Management Conference 2009
INFORMATION MANAGEMENT by John Ostrowski
The Coordinated Database
Paul T. Smith, Esq. Partner, Davis Wright Tremaine LLP
Student Data & Privacy.
Student Confidentiality: The FERPA/HIPAA Facts
Presentation transcript:

Cyber Security Training Assessment for Indian Army Cyber security for Social Networking 18 February 2015 Command HQ complex, Delhi Cantt.

Types of Accounts Personnel Accounts Established in personal capacity Registered with a personal Nature of communications personal and limited to public information Uses appropriate disclaimers Official Accounts Established in official capacity By authorisation of official notification Limited to outreach by a mandated social media policy

Legal Landscape Laws General Laws Information Technology Act, 2000 Terms of Service of the provider Policies Cyber Security Policy, 2014 Office memorandums

Specific concerns Security Maintaining system integrity Privacy and surveillance Disclosures and restricted communication Record retention Cyber Terrorism

Thank you