Presentation is loading. Please wait.

Presentation is loading. Please wait.

Module #2: What Sensitive Data is and how to handle it Module 2 is approximately 3min and 30 sec.

Similar presentations


Presentation on theme: "Module #2: What Sensitive Data is and how to handle it Module 2 is approximately 3min and 30 sec."— Presentation transcript:

1 Module #2: What Sensitive Data is and how to handle it Module 2 is approximately 3min and 30 sec.

2 What is Sensitive Data? The City of Albuquerque handles a great deal of sensitive information, including data known as Personally Identifiable Information commonly called PII. PII is targeted by hacker because it is highly valuable information that can be used for identity theft, fraud, or used to attack other organizations. The improper disclosure of sensitive data can cause great harm and embarrassment to City and its staff. Each of us is responsible for the protection of any sensitive data in our custody. PII is defined as any information that can identify a specific individual, such as Social Security Numbers and passport numbers, your driver’s license number, or any other personally identifiable information.

3 Who is responsible for keeping Sensitive Data safe? Sensitive data comes in many forms which include, electronic, printed, voice, etc. Because PII information is so valuable, and because we are committed to protecting the rights and privacy of others, it Is each of our responsibilities to take steps to protect PII or any other highly confidential information.

4 Protecting Sensitive Data The following tips will help in the protection of this data. ensure that sensitive data is stored only on authorized systems. These are systems that have strong security measures such as strict controls on how they are configured and who can access them. ensure that only authorized people who have a need to know can access sensitive data. This means these individuals not only have prior management approval to access such data, but they need access to accomplish their job responsibilities. To prevent the spread of a virus or worm, only use authorized mobile devices that have been approved. Scan all contents on the device with current anti-virus before opening any files

5 Protecting Sensitive Data (con’t) Never store un-encrypted sensitive data on a portable device. If you transfer PII or any other sensitive data, use only secure, authorized methods that support encryption (e.g. Secure FTP, encrypted thumb drives). Do not transfer sensitive data using insecure means, such as email. Never print sensitive data on a printer that is publicly accessible All physical and electronic PII and other sensitive information that is no longer necessary or appropriate to store should be properly destroyed, shredded, or rendered unreadable. For digital media such as hard drives or USB flash drives, this means they should either be physically destroyed or the media should be entirely wiped

6 Questions Module 2: Sensitive Data Question #1: Who’s responsibility is it to protect Sensitive Data? A.The owner of the data B.The IT liaisons for each department C.The IT Department D.The supervisor of the department E.The person using the data F.All the above

7 Questions Module 2: Sensitive Data Question #1: Who’s responsibility is it to protect Sensitive Data? The answer is F. Everyone is responsible for the protection of Sensitive Data.

8 Questions Module 2: Sensitive Data Question #2: What are some methods to best protect sensitive data? A.Ensure that sensitive data is stored only on authorized systems B.Allow all staff to have access to sensitive data as it is public data anyway C.Never store un-encrypted sensitive data on a portable device. D.You should scan all contents of a mobile storage devices such as USB flash drives, external hard drives with current anti-virus before opening any files E.A, C, D F.All the above

9 Questions Module 2: Sensitive Data Question #2: What are some methods to best protect sensitive data? The answer is E, A. Ensure that sensitive data is stored only on authorized systems C. Never store un-encrypted sensitive data on a portable device. D. You should scan all contents of a mobile storage devices such as USB flash drives, external hard drives with current anti-virus before opening any files E. A, C, D

10 Questions Module 2: Sensitive Data You have completed Module 2 on Sensitive Data. To learn about Phishing attacks and how to recognize and not be a victim of a phishing attack, continue to module 3.


Download ppt "Module #2: What Sensitive Data is and how to handle it Module 2 is approximately 3min and 30 sec."

Similar presentations


Ads by Google