Download presentation
Presentation is loading. Please wait.
2
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University efd2@cornell.edu efd2@cornell.edu
3
What IR practitioners can do Legal consequences of data loss Resources
4
Don’t take work home If you must access student or other sensitive data from home, use a secure connection like Remote Desktop in Windows XP Use a VPN connection Wireless access –Create a closed network –Rename network –Encrypt –Update software regularly –Set adminstrator password –Disable file sharing
5
At Work Store student data files on a secure server, not on your personal computer Turn your computer off at night if you can be backed up during the day Strip identifying student information from data files when you work on them (ssn, address, name)
6
Securing your computer Run an anti-virus program daily Enable file autoprotect (Symantec Anti-Virus) Use complex passwords (test with password tester) Activate Windows Firewall Run Spybot, Windows Defender and Ad-Aware frequently Secure Delete
7
Secure your computer (cont) Turn off file sharing on your computer Turn off guest accounts Don’t use the administrator account on your computer for routine work Turn on a password protected screen saver for when you are away from your computer Lock your office Monitor your network traffic and usage Turn off FTP if you are not using it
8
Secure your computer (cont) Clear out your web browser cache Set Windows to automatic update Be sure that your anti-virus software is updated frequently
9
When traveling with a laptop Use an encrypted flash (thumb) drive Keep close physical possession of your computer and data Remove sensitive data from the laptop before travel If you need sensitive data, store it on a separate device like a CD and store it separately from the laptop Use full disk encryption
10
Sharing data Zip and password protect before sending Try not to send files via email Cornell has the registrars drop box. Files are encrypted during transport over SSL (https://) using strong encryption only.
11
New York Information Security Breach and Notification Act Any NYS resident whose private information was acquired by a person without valid authorization must be notified You must notify the NYS attorney general, NYS consumer protection board, NYS office of cybersecurity Other states, including California, are passing similar laws
12
What to do if data security is breached Notify security office –Scan –Traffic analysis –Image –System (log) analysis IT security may report to data loss team (audit, police, counsel, communications, risk management, IT, representatives from unit)
13
Resources http://www.cit.cornell.edu/computer/security/secure.html Securing your web browser http://www.cert.org/tech_tips/securing_browser/ EDUCAUSE http://www.educause.edu/security Using wireless technology securely http://www.us- cert.gov/reading_room/Wireless-Security.pdf Procedures for dealing with security breach http://www.cit.cornell.edu/computer/security/data- loss-prepare.html
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.