10 Things You Need to Know AboutData Security Melanie Wyne, J.D. Sr. Technology Policy Representative Government Affairs Division NAR.

Slides:



Advertisements
Similar presentations
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
Advertisements

What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
PIPA PRESENTATION PERSONAL INFORMATION PROTECTION ACT.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Gramm-Leach-Bliley Act for Financial Aid Val Meyers Associate Director Michigan State University.
Protecting Personal Information Guidance for Business.
Securing NPI Mary Schuster Mike Murphy.  Gramm-Leach-Bliley Act Enacted to control the ways that financial institutions deal with the private information.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Allison Dolan Program Director, Protecting PII Handling Sensitive Data - WISP and PIRN.
1 CLOUD AND SaaS-BASED PLATFORMS: ENSURING DATA PRIVACY May, 2011.
Steps to Compliance: Bring Your Own Device PRESENTED BY.
IT Retreat 2009 IT Security Controls and Initiatives.
Developing a Records & Information Retention & Disposition Program:
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Information Security for HIPAA Second Meeting for Researchers Michael Caputo February 18, 2003.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
SMART GRID: Privacy Awareness and Training – for PUCs/PSCs A Starting Point December 2011 SGIP-CSWG Privacy Group 1 DRAFT.
10 Essential Security Measures PA Turnpike Commission.
Certificate and Key Storage Tokens and Software
New Data Regulation Law 201 CMR TJX Video.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
ESCCO Data Security Training David Dixon September 2014.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Florida Information Protection Act of 2014 (FIPA).
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
Murphy’s Law If anything can go wrong, it will.. 2 Data Security and Confidentiality “… a firm belief in Murphy’s Law and in the necessity to try and.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Custom Software Development Intellectual Property and Other Key Issues © 2006 Jeffrey W. Nelson and Iowa Department of Justice (Attach G)
Privacy in Healthcare Challenges Associated with Implementing Privacy in an Electronic Health Records Environment John P. Houston, J.D. Vice President,
© MISHCON DE REYA MAY 2014 RECRUITMENT INTERNATIONAL FINANCIAL DIRECTORS’ FORUM Protecting your business from unlawful competition.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Security in ERP Systems By Jason Rhodewalt & Marcel Gibson.
Data Breach: How to Get Your Campus on the Front Page of the Chronicle?
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Put a Lock on It: Protecting your online privacy A project of Consumer Action |
Staying ahead of the storm: know your role in information security before a crisis hits Jason Testart, IST Karen Jack, Secretariat.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Personal data protection in research projects
TOP 10 DHS IT SECURITY & PRIVACY BEST PRACTICES #10 Contact The Office of Systems & Technology for appropriate ways to proceed if you need access to.
Compliance, Defensibility & Usability of Information on a Global Stage Monday, October 19, :00 – 10:30 AM Global Legal Issues 1.
Privacy Information for Advisors. Agenda PIPEDA Advisor Required Privacy Program Our MGA Privacy Program Recommendations for Advisors.
Privacy Compliance in Schools Darrebin A/P’s Network 7 May 2009.
New EU General Data Protection Regulation Conference 2016 Managing a Data Breach Prevention-Detection-Mitigation By Gerard Joyce Dun Laoghaire Feb 24 th.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
Workday: Data Privacy and Security Overview
The Health Insurance Portability and Accountability Act 
Protection of CONSUMER information
Virtual Private Networks
Chapter 3: IRS and FTC Data Security Rules
Privacy & Access to Information
Protecting Personal Information Guidance for Business.
Data Protection and GDPR – An introduction for Baptist Churches
CompTIA Security+ Study Guide (SY0-401)
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
Mathew Norman, Policy & Public Affairs Officer, RLA Wales
Preparing for GDPR Sharing experiences of the process and using the British Canoeing Toolkit bit.ly/BCGDPRToolkit
Privacy and Cyber Security for Payroll Pros: A Global Perspective
Information Security in Your Office
Anatomy of a Common Cyber Attack
Presentation transcript:

10 Things You Need to Know AboutData Security Melanie Wyne, J.D. Sr. Technology Policy Representative Government Affairs Division NAR

Data Breach is Inevitable

Complex Regulatory Environment

What Info are You Collecting?

Do You Need Everything You Collect? No one can steal what you don’t have Make certain you have a current business purpose for all info you collect Hold on to information only as long as you have a legitimate business need.

If you Need the Data—Secure It! Make sure only the employees/associates who need access to data have it. – Control access to databases containing sensitive personal information – Locked cabinets for paper files – Require secure passwords and authentication Complex/unique passwords – Antivirus software – Encrypt data during storage and transmission

Secure Remote Access to Your Network Secure mobile access points—phones, tablets other mobile devices Think about 3 rd party access to your network/data – Restrict access to specific IP addresses – Grant only temporary/limited access

Consider Vendors/Service Providers Insist that appropriate security standards are part of your vendor contracts Seek indemnification

Security is an Ongoing Process Update/patch 3 rd party software Continuously train employees

Prepare for a Breach Ahead of Time Identify single point of contact in the case of a breach Draft consumer notice Consider professionals/consultants necessary – IT – Legal – Media – Government Affairs

Resources Realtor.org Privacy & Data Security toolkit Federal Trade Commision FTC.gov

Thank You Melanie