STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES 1 The Technical Services Stuff in IT Services A brief tour of the technical and service offering plethora.

Slides:



Advertisements
Similar presentations
IT Security Policy Framework
Advertisements

Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Confidentiality and HIPAA
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
HIPAA Health Insurance Portability and Accountability Act.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Privacy Laws & Higher Education. Agenda 1.Five Privacy Laws a.FERPA b.HIPAA c.GLB d.FACTA Disposal Rule e.CAN-SPAM 2.Overview of the Laws a.What does.
NAU HIPAA Awareness Training
HIPAA Basics A Matter of Integrity. Introduction “A Matter of Integrity” defines HIPAA and protecting patient health information. Success depends on our.
HIPAA Security Regulations Jean C. Hemphill Ballard Spahr Andrews & Ingersoll, LLP November 30, 2004.
Voice over the Internet Protocol (VoIP) Technologies… How to Select a Videoconferencing System for Your Agency Based on the Work of Watzlaf, V.M., Fahima,
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2.5 HIPAA Legislation and its Impact on Physician Practices 2-15 The Health Insurance Portability.
Division of Information Resources Collaborating with Office 365 Storage Options and Classifications.
Security Controls – What Works
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Informed Consent and HIPAA Tim Noe Coordinating Center.
INFORMATION SECURITY UPDATE Al Arboleda Chief Information Security Officer.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
HIPAA – Health Insurance Portability & Accountability Act and the Privacy Act MSgt Nechele M. Chambers Senior Enlisted Liaison TRICARE Area Office-Europe.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
The University of Kansas Medical Center Shadow Experience Training.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
The Use of Health Information Technology in Physician Practices
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
An Educational Computer Based Training Program CBTCBT.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Student Confidentiality: The FERPA/HIPAA Facts AISD Policy Student Records AISD Procedure AP. 11.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
Eliza de Guzman HTM 520 Health Information Exchange.
HIPAA BASIC TRAINING MODULE 1C – Overview (For staff who do not generally create Protected Health Information) Anderson Health Information Systems, Inc.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Working with HIT Systems
STANFORD UNIVERSITY RESEARCH COMPUTING Are we outliers? Institutional minimum security requirements RUTH MARINSHAW OCTOBER 14, 2015.
Working with HIT Systems Unit 7a Protecting Privacy, Security, and Confidentiality in HIT Systems This material was developed by Johns Hopkins University,
HIPAA HEALTH INSURANCE PORTABILITY ACOUNTABILITY ACT.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
Mary Trauner Senior Research Scientist Georgia Institute of Technology Middleware for Video.
Company Proprietary and Confidential Texas Association of Community Health Centers - Proprietary and Confidential Fourth and Goal: Score with Meaningful.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
HIPAA Privacy What Every Staff Member Needs to Know.
Slide No. Topic 3 Introduction 4 Definition 5-8 Process and Procedures 9-10 Benefits 11 Suitability and Safety Technology to be Used I C T.
Encrypted from CDS Office Technologies
East Carolina University
Privacy & Confidentiality
Student Confidentiality: The FERPA/HIPAA Facts
Move this to online module slides 11-56
Disability Services Agencies Briefing On HIPAA
Securing Your Web Application and Database
CompTIA Security+ Study Guide (SY0-401)
Lesson 1  7 Basic Components of an Effective Compliance Plan
Student Confidentiality: The FERPA/HIPAA Facts
Presentation transcript:

STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES 1 The Technical Services Stuff in IT Services A brief tour of the technical and service offering plethora – who knew???? Technology Training Services October 2009

STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES page 2 Course Goals To help you integrate into IT Services by gaining the technical and service-oriented knowledge needed to be more productive. To improve your awareness of and promote the services, resources, and tools that the various groups within IT Services provide (to the campus at-large and also within IT Services). To provide a functional overview of the services and products, and how they interrelate across computing organizations and why they are important to the campus as well as IT Services.

STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES page 3 Course Agenda The technical overview of the services provided by each of the main divisions within IT Services Strategic Planning Human Resources Architecture Research Computing Computing Services Communication Services Client Support Business Services

STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES page 4 Administrative Guide Policies  Policies: Admin Guide 1: University Code of Conduct Admin Guide 61: Administrative Computing Systems Admin Guide 62: Computer and Network Usage Policy Admin Guide 63: Information Security Admin Guide 64: Identification and Authentication Systems Admin Guide 66: Chat Rooms and Other Forums Using Stanford Domains or Computer Services Admin Guide 67: Information Security Incident Response Admin Guide 81.1: Telecommunication Services Admin Guide 81.3: Provision of Mobile Equipment and Related Services Admin Guide 84: Credit Card Acceptance and Processing

STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES page 5 HIPAA and FERPA  HIPAA (Health Insurance Portability and Accountability Act) Protects the privacy of an individual’s health information and govern the way certain health care providers and benefits plans collect, maintain, use and disclose protected health information (“PHI”). Be sure appropriate procedures are maintained to ensure that the HIPAA privacy and security rules are followed.  FERPA (Family Educational Rights and Privacy Act) Provides students the right to consent to disclosures of personally identifiable information contained in the student’s education records. Students, faculty, and others with questions regarding student records should contact the Office of the University Registrar.

STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Security Issues  Important security concepts all IT Services employees need to know and understand: Admin Guide 63 Data Classification (Confidential, Restricted, Prohibited, and Public) Encryption Passwords: always use a secure connection when sending your password! Kerberos Secure Socket Layers (SSL) and Secure SHell (SSH) Stanford Desktop Tools Computers: be aware of how to encrypt the contents of your computer! Stanford Whole Disk Encryption: (SWDE) Windows: Mac: FileVault (System Preferences > Security > FileVault) page 6