Preventing a Sensitive Data Loss: Laptops Marc Scarborough.

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

Compliance with Federal Trade Commission’s “Red Flag Rule”
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
© 2014 Nelson Brown Hamilton & Krekstein LLC. All Rights Reserved PRIVACY & DATA SECURITY: A LEGAL FRAMEWORK MOLLY LANG, PARTNER, NELSON BROWN & CO.
Presented By Drexel and FMFCU.
Privacy (or Data) Breaches - Examples South Carolina Department of Revenue Hackers got into the SCDOR’s computers, and stole information on up to 3.2 Million.
TAX-AIDE Computer Security Chris Hughes Chairman NTC 1 NLT Meeting Aug 2014.
Protecting Your Identity: What to Know, What to Do.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
TAX-AIDE Computer Security Chris Hughes (HMR mod) Chairman NTC 1 NLT Meeting Aug 2014.
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
Presented By The Plano Police Department Crime Prevention Unit.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Information and Systems Security/Compliance Security Day The Information and Systems Security/Compliance Program Dave Kovarik.
Office of Personnel Management (OPM) Data Breach A briefing for use by DON commanders and supervisory staff
Information Security Office 1 Copyright Statement Copyright Mary Ann Blair This work is the intellectual property of the author.
Online and Mobile Banking. Online banking Online Banking  Online banking is a fairly established practice in our internet-saturated world.  Many people.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Identity Theft Insurance Charles P. Orlowicz November CAS Annual Meeting – Session CS04 A division of the property and casualty subsidiaries.
General Awareness Training
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
How to Backup FNC Files to Corporate Network Using Windows XP Created By: Ricardo G. Mesa, Systems Administrator Date: January 17, 2006.
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
Identity Protection (Red Flag/PCI Compliance/SSN Remediation) SACUBO Fall Workshop Savannah, GA November 3, 2009.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
Protecting Your Organization Identity Theft and Data Breach.
Identity Theft Project Erin L. Caraway Jacob Locke.
Usage Notes Revision date: Feb 2011 Objective & Audience: This content provides sales conversation “starters” for companies that sell IT security solutions.
The State of Computer & Data Security in Corporations Independent Survey.
Data Breach: How to Get Your Campus on the Front Page of the Chronicle?
Identity Theft The Nation’s Fastest Growing Crime.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 (C)2012 National Endowment for Financial Education | Lesson 2-5 Identity.
You. are at risk for the fastest growing crimes crime.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Identity Theft One of America's fastest growing crimes.
Protecting Your Assets By Preventing Identity Theft 1.
IDENTITY FINDER TRAINING. What is Identity Finder?  Identity Finder is a program that is installed on your desktop, laptop, or server to locate personally.
PROTECTING YOUR CREDIT PG NAME, TEACHER AND DATE.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
1 Identity Theft Prevention and the Red Flag Rules.
Treat it like it’s yours: best practices for handling student transcript data Bob Hughes Application Support Manager North Orange County CCD CCCTran Steering.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
Identify Theft in the Cyber Age Ronald J. Leach. What we ’ re going to talk about – Identity Theft How bad is it? How bad is it? How vulnerable are you?
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Lesson 10A: The Three D’s of Identify Theft
Protecting Your Assets By Preventing Identity Theft
E&O Risk Management: Meeting the Challenge of Change
Chapter 3: IRS and FTC Data Security Rules
Information Security Session October 24, 2005
Red Flags Rule An Introduction County College of Morris
Identity Theft Prevention Program Training
Colorado “Protections For Consumer Data Privacy” Law
Identity Theft Samuel H. Slater.
Presentation transcript:

Preventing a Sensitive Data Loss: Laptops Marc Scarborough

Laptops: A Growing Risk? Last year, laptop sales outpaced desktop sales for the first time (1) 2 Netbooks, or ultraportable notebooks, are selling at an amazing pace, especially in this market. They are priced ~$300.00

Laptops: A Growing Risk? The FBI states laptop thefts are up almost 48% (1) 3 The most common areas are parking lots, driveways, homes, and…

Laptops: A Growing Risk? One study estimates 12,000 laptops are lost or stolen in US Airports *every week* (1) 4

Data Loss Legal Landscape Texas State Law requires notification if “sensitive personal information” is lost. –"Sensitive personal information": (A) means an individual's first name or first initial and last name in combination with any one or more of the following items, if the name and the items are not encrypted: (i)social security number; (ii)driver's license number or government-issued identification number; or (iii)account number or credit or debit card number in combination with any required security code, access code, or password that would permit access to an individual's financial account; and” (4) 5

Lost Laptop: The Cost of Data Loss According to the FTC, the current average to notify victims of data theft is over $200 per person (3) –Notification via postal mail, and phone is expensive –A Call Center, website and support must be established to answer questions and provide guidance –Most organizations offer credit monitoring The damage to an organization’s reputation is the most expensive 6

Rice IT’s Next Steps Developing encryption options –Windows, Macintosh, Flash Drives Training of our staff 7 Apple FileVault

Rice IT’s Next Steps Need or want encryption? –For now, or call me Marc Scarborough More information coming over the summer 8

Questions? Thank you for your time! 9

Sources (1) “Security Slideshow: 10 Things You Need to Know NOW About... Laptop Security” – Laptop-Security/?kc=rsshttp:// Laptop-Security/?kc=rss (2) “Data Breaches Costing Customers, Not Just Money” – Money/?kc=rsshttp:// Money/?kc=rss (3) “Federal Trade Commission – 2006 Identity Theft Survey Report” – (4) “79(R) SB 122 – Enrolled Version” – 10