Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.

Slides:



Advertisements
Similar presentations
COMPLYING WITH PRIVACY AND SECURITY REGULATIONS Overview MHC Privacy and Security Committee Revised 1/17/11.
Advertisements

University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Hipaa privacy and Security
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
Confidentiality and HIPAA
NAU HIPAA Awareness Training
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
HIPAA Security Regulations Jean C. Hemphill Ballard Spahr Andrews & Ingersoll, LLP November 30, 2004.
Welcome to UF We’re from the Privacy Office and we’re here to help you… HIPAA Orientation College of Nursing– Fall 2014 Cheryl Webber, MS, RHIA University.
Springfield Technical Community College Security Awareness Training.
Security Training Lunch ‘n Learn. Agenda  Threat Analysis  Legal Issues  Threat Mitigation  User Security  Mobile Security  Policy Enforcement.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
KDE Employee Training. What IS a Data Breach? Unauthorized release (loss or theft) of Sensitive or Confidential Data, such as PII, PHI, etc. On site or.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
PII – Identifying and Managing Risk Presented by: UNL Office of Internal Audit and ITS Security March 2014.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
New Faculty Orientation to Privacy and Security at UF Susan Blair, Chief Privacy Officer Kathy Bergsma, Information Security.
The Family Educational Rights and Privacy Act (FERPA) The Importance of Protecting Student Records This session will help you better understand the law.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
HIPAA Privacy & Security EVMS Health Services 2004 Training.
Desktop 1 Owning the Desktop: Is.edu like.com? Scott Bradner Harvard University University Technology Security Officer 28 June 2006.
Protecting Sensitive Information PA Turnpike Commission.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
STANDARD 5.3 Objective 3 Students will explain and understand the need for confidentiality.
Office of Compliance & Corporate Integrity Patient Privacy and Security of Patient Information Ray Braeunig, CHC, CHPC, CHRC Chief Compliance & Privacy.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Year 10 ICT. What is it about?  This module sets out essential concepts and skills relating to the ability to understand main concepts underlying the.
Eliza de Guzman HTM 520 Health Information Exchange.
SPH Information Security Update September 10, 2010.
Why Respect Privacy and Confidentiality? Access to Confidential Information (OP ) Protection and Security of Protected Health Information (OP.
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.
Data Breach: How to Get Your Campus on the Front Page of the Chronicle?
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Prepared by The Office of the Registrar Youngstown State University February, 2009.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Configuring Electronic Health Records Privacy and Security in the US Lecture a This material (Comp11_Unit7a) was developed by Oregon Health & Science University.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
What lessons can we learn from other data breaches? Target Sentry Insurance Dynacare Laboratories 1 INTRODUCTION.
FERPA Family Educational Rights and Privacy Act of 1974 (also known as the Buckley Amendment)
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
1 HIPAA Information Security Awareness Training “Good Computing Practices” for Confidential Electronic Information For All NXC Employees October 2011.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Welcome to the ICT Department Unit 3_5 Security Policies.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
IT Security  .
Year 10 ICT ECDL/ICDL IT Security.
Chapter 3: IRS and FTC Data Security Rules
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
HIPAA Overview.
HIPAA & PHI TRAINING & AWARENESS
Introduction to the PACS Security
The Health Insurance Portability and Accountability Act
School of Medicine Orientation Information Security Training
Presentation transcript:

Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce

Module 1 - Introduction 2 General Awareness: Information Security Prevent Risks Protect Information Threats

Module 1 - Introduction 3 Principles of Information Security

Module 1 - Introduction 4 What Are We Trying to Prevent? Violation of privacy Identity theft Loss of competitive advantage Loss of computer and network resources Copyright violations and other illegal uses

Module 1 - Introduction 5 What Must Be Protected? Servers and Networks Offices and Buildings Information Desktop and Portable Computers

Module 1 - Introduction 6 Protected From What Threats? Computer Accident or Hardware Failure Computer Hackers Weather Malware - Virus, Worm, Spyware Laptop, PDA Thieves Phishing Scams

Module 1 - Introduction 7 What Is Important?

Module 1 - Introduction 8 Individually identifiable health information; health information combined with name, or med record #, or address, or key dates, or family members, or any other information that would link a person to their health condition. What Kind of Information ? Protected Health Information (PHI)

Module 1 - Introduction 9 Individually identifiable student information; name or UF ID or SSN or photo, in combination with grades, demographics, admissions, schedules, class rosters, financial, or any information needed and used by our faculty and staff about our students, with the exception of a limited amount of directory information. Student Records What Kind of Information ?

Module 1 - Introduction 10 What Kind of Information ? Names combined with SSNs, or drivers license numbers or Florida Ids, or any Financial account numbers and access codes, or any other information that could be used to commit fraud using someone else’s identity. Personal Identification Information ( of anyone including faculty, staff, vendors and clients )

Module 1 - Introduction 11 Student Records Protected By Laws HIPAA FERPA Florida Statutes, Chapter (aka House Bill 481) Protected Health Information (PHI) Personal Identification Information (of anyone including faculty, staff, vendors and clients)

Module 1 - Introduction 12 Personal Identification Information (of anyone including faculty, staff, vendors and clients) Student Records MUST Be Safeguarded Wherever It is Used or Stored HIPAA FERPA Florida Statutes, Chapter (aka House Bill 481) Protected Health Information (PHI)

Module 1 - Introduction 13 Research Academic Business Other Important to UF HSC Needs To Be Safeguarded Too

Module 1 - Introduction 14 Summary Servers and Networks Thumb Drives Computer Hackers And Thieves Natural Disasters Different Types of Information Confidentiality, Integrity, Availability info

Module 1 - Introduction 15 Your Responsibilities Protect Information and our Computing Environment Learn and Practice Safeguards Review General Awareness Training Regularly