Security Compact.  Only authorized security administrators shall be allowed to create a user account for the PowerSchool application.  The LEA security.

Slides:



Advertisements
Similar presentations
Protect Our Students Protect Ourselves
Advertisements

(you must put the “s” in https to access)
Password Security How secure are your passwords ? Why do we need passwords or do we need them ? Should they be simple or complex ? When should we assign.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
Thoughts on Technology Issues for Small Business Implementing Technical Safeguards to support Your Policies.
PowerChart Basics Session 1 June Goal: To acquaint the user with the basics of PowerChart patient information security. Objective: 1.State the importance.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Setting up Your Interact Account BY RA Routsong. What is an Interact Account  Interact is the CCSD on-line communication system.  Administrators, Teachers,
Do Loops A Do..Loop terminates based on a condition that is specified Execution of a Do..Loop continues while a condition is True or until a condition.
Jing Cast for Creation of a Professional Gmail Account By Matt Chonka EDTC6432: Essentials of Computer Authoring.
10 Essential Security Measures PA Turnpike Commission.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
CSP Annual Security Training Miranda Gregory, CSP Analyst Carroll County Department of Citizen Services.
ONLINE TRACKING INCIDENT SYSTEM Health Standards Section October 2010.
TIMS LOGIN AND APPLICATION INFORMATION Spring
Learning series creating agency users virtual classroom.
CS105 Lab 1 – Introduction Section: ??? TA: ??? ??? Announcements CITES Accounts Compass Netfiles Other Administrative Information CS105 Fall
Federal Student Aid Identification username and password – this is how students and parents will sign the FAFSA application. The FSA ID process replaced.
You will find applications that are installed on the computer. Go to Start – Programs (depending on view Start – All Programs). All applications installed.
CIS 450 – Network Security Chapter 8 – Password Security.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Best Practices for Protecting Data. Section Overview Mobile Computing Devices Technical Procedures Data Access and Permissions Verbal Communication Paper.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Privacy and Information Management ICT Guidelines.
Chapter 1 Getting Started. 2Practical PC 6th Edition Chapter 1 Getting Started FAQs Where’s the power switch? What is the boot process? What is a user.
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
Network Security and Troubleshooting An in-service for users of Windows XP Pro on Windows Server 2003.
University Health Care Computer Systems Fellows, Residents, & Interns.
PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Chapter 1 Getting Started. 2Practical PC 5 th Edition Chapter 1 Getting Started In this Chapter, you will learn: − How to power up the computer − About.
SCC Student Technology Access Student Login Guide SCC College Computer Press Ctrl-Alt-Delete keys on the keyboard to access network login User name – this.
Networking and Health Information Exchange Unit 9b Privacy, Confidentiality, and Security Issues and Standards.
Signing On General Lesson 2. Objectives Following completion of this lesson you will be able to:. Open the Meditech application. Sign on to Meditech.
Wayne County Public Schools Technology Usage and Policies.
Changing Your Password General Lesson 3. Objectives Following completion of this lesson you will be able to:. Define how often a password must be changed.
Student Experience It’s your education Type the web site address into the browser given to you by your junior high or high school Select “I am a student”
Using SkyWard Family Access. SKYWARD FAMILY ACCESS Go to What is Family Access? Family.
NC Wise Security & Passwords Revised: July 29, 2008 Developed by: Jennifer Jenkins, Cabarrus County Schools.
SCSC 455 Computer Security Chapter 3 User Security.
NCWISE Marks Spreadsheet Training. Stanly County Schools ©2005 Attendance Review Login Select the course / period / homeroom Access student List Place.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Page ADP PearsonAccess Proctor Training. Page Agenda Test Overview Testing Components Proctor Roles and Responsibilities Overview Administering the Test.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
ICT Laptops Passwords Encryption Back-ups Data Protection and the Internet Viruses Social Networking / Professional Conduct.
Understanding Security Policies Lesson 3. Objectives.
Google Apps for Education Account Overview for Staff.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Introduction to NC WISE
What is Information Security?
HIPAA Privacy & Security
Chapter 1 Getting Started
Staying Austin College
Things To Avoid: 1-Never your password to anyone.
HOW TO SETUP BELKIN ROUTER?. STEP 1: You need to start from connecting the hardware.You need to unplug your modem from the power source. If you cannot.
HOW TO SETUP CISCO ROUTER?. STEP 1: You need to start from connecting the hardware.You need to unplug your modem from the power source. If you cannot.
HOW TO SETUP DLINK ROUTER?. STEP 1: You need to start from connecting the hardware.You need to unplug your modem from the power source. If you cannot.
Robert Leonard Information Security Manager Hamilton
Online Testing System Assessment Viewing Application (AVA)
PowerChart New User Tutorial
Student PowerSchool Login
Start at our website at In the upper right hand corner is a link for “Office 365”
Powerschool for Parents
Student Experience It’s your education.
Online Testing System Assessment Viewing Application (AVA)
Interim & Diagnostic Teacher Item Previewer
HIPAA Privacy & Security
Assessment Viewing Application (AVA) for Interim Assessments
Presentation transcript:

Security Compact

 Only authorized security administrators shall be allowed to create a user account for the PowerSchool application.  The LEA security administrator, or his/her designee, is responsible for promptly disabling the PowerSchool user account upon termination of a user from the school or LEA or upon cessation of a user’s needs to access the PowerSchool system.  Passwords used for the PowerSchool system should be unique to PowerSchool.  Passwords should not contain dictionary words or abbreviations.  Passwords expire every 90 days and users must create a new password. Passwords cannot be reused until 5 other passwords have been used.  At no time, will anyone from DPI or County Office call a user and request a user’s password; NO CCS employee should release his or her password to anyone. What’s the same: Passwords

 Users must never share passwords with anyone.  Users must never allow a teacher assistant, students, substitute teachers, student teachers, or anyone else to enter or view any information in PowerSchool. What’s the same: Workstation Security

 After five unsuccessful login attempts, the user account is disabled.  Passwords must contain at least 1 uppercase letter, 1 lowercase letter, 1 special character, and 1 numeric character. What’s changed: Passwords

 Users must never leave their computer without “LOCKING” the application or without signing out of PowerSchool and/or locking your workstation.  Passwords should not be stored in clear text on a desktop system, including web browsers, nor should they be written down and visibly displayed in the vicinity of the computer workstation.  Word or text file  Sticky notes on your desk or monitor  PowerSchool should never be accessed from a shared public location outside of the LEA such as a public computer lab or public Wi-Fi hotspot.  Starbucks  Panera Bread  Workstations should be checked for the presence of “keystroke memory plugs” or more commonly named “key loggers”. These are 0.75 – 1 inch devices, shaped like a plug or cylinder, which can be plugged in between the keyboard cable and the CPU. What’s changed: Workstation Security

 You could get hacked!  No matter how secure you think you are, it could still happen.  You are working with sensitive information  Students addresses, grades and medical information  Social security number  A district near us, got hacked in March, exposing students information  Union County Why should you care?

 Read and understand the compact before you sign.  Don’t chance it. Take Security Seriously