We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byTavion Hickerson
Modified over 2 years ago
© 2012 Boise State University1 Click for Next Slide! Information Security on the Front Lines Created By OIT Information Security Services
© 2012 Boise State University2 Click for Next Slide! Universities in the News! University of Idaho 70,000 Donor Records University of Texas at Austin 225,000 Student Records UCLA 500,000 Student Records
© 2012 Boise State University3 Click for Next Slide! University NOT in the News! Boise State University Zero Lost Records So Far! Go Broncos!
© 2012 Boise State University4 Click for Next Slide! The Information We Keep Students, Faculty, Staff, Donors, Contractors Financial Records Grades Credit Card Information Health Care Information Addresses Phone Numbers Insurance Records Social Security Numbers All Protected By Law!
© 2012 Boise State University5 Click for Next Slide! Alphabet Soup Everybody Loves Acronyms! FERPA HIPAA PCI-DSS GLBA SOX Red Flag Alerts Idaho Code §
© 2012 Boise State University6 Click for Next Slide! Alphabet Soup PII P ersonally I dentifiable I nformation This is the Key Acronym!
© 2012 Boise State University7 Click for Next Slide! Alphabet Soup FERPA F amily E ducational R ights and P rivacy A ct Protects the privacy of students educational records Non-compliance? Loss of federal funding Fines Expose students to identity theft
© 2012 Boise State University8 Click for Next Slide! Alphabet Soup HIPAA H ealth I nformation P ortability and A ccountability A ct Protect confidentiality of health care information Protect workers health insurance when changing jobs Standardize electronic health care data interchange Non-compliance? Fines Expose students and employees to identity theft
© 2012 Boise State University9 Click for Next Slide! Alphabet Soup PCI-DSS P ayment C ard I ndustry D ata S ecurity S tandard Industry requirements for protecting customer payment account information – Established by consortium of the major payment card brands Non-Compliance? Increased fee$ for accepting credit card payments Mandatory PCI-DSS audits (paid for by Boise State) Identity Theft
© 2012 Boise State University10 Click for Next Slide! Alphabet Soup GLB G raham- L eech- B liley A ct of 1999 Requires financial institutions to protect their customers personally identifiable information Non-Compliance? Fines Exposure of students, families, and employees to identity theft
© 2012 Boise State University11 Click for Next Slide! Alphabet Soup SOX S arbanes- OX ley Act of 2002 Requires all publicly held companies to submit an annual assessment of the effectiveness of their internal financial auditing controls to the Securities and Exchange Commission Officers of the companies must certify that they arent cooking the books
© 2012 Boise State University12 Click for Next Slide! Alphabet Soup Red Flag Alerts Fair and Accurate Credit Transactions Act Requires monitoring and alerting for suspicious transactions that could indicate identity theft or fraud Broad list of suspicious transactions
© 2012 Boise State University13 Click for Next Slide! Alphabet Soup Idaho Code § Idahos Identity Theft Law Requires reporting of security breaches which expose Personally Identifiable Information that can be used to obtain credit, apply for Drivers License, or apply for other forms of identification
© 2012 Boise State University14 Click for Next Slide! Boise State Policies Information Technology Resource Use (BSU # 8000) Information Privacy and Security (BSU # 8060) Cash Handling (BSU # 6010)
© 2012 Boise State University15 Click for Next Slide! Alphabet Soup - - TMI !!! Or TMA -- too many acronyms! What should I do?
© 2012 Boise State University16 Click for Next Slide! Protect Constituent Data If you print itgo get it Shred it if you can Be sure you can release it If you arent sure, check with your supervisor Lock it up! Dont leave sensitive information in the open That includes laptops and other mobile media Know What Boise State Policy Requires
© 2012 Boise State University17 Click for Next Slide! Follow Information Security Best Practices Use strong passwords Change passwords often Use different passwords on different systems Never share your password
© 2012 Boise State University18 Click for Next Slide! Follow Information Security Best Practices Password protect your screensaver Manually lock your screen whenever you leave your desk Store sensitive information on file servers Never open unsolicited from an unknown source or click on unfamiliar web addresses Be sure your computer and anti-virus software are up-to- date
© 2012 Boise State University19 Click for Next Slide! Follow Information Security Best Practices Know who to call I think my computer is infected, what do I do? Call the Help Desk at I think Ive lost the USB drive I used to take some sensitive files home to work on, what do I do? Call the Information Security Office at
© 2012 Boise State University20 Click for Next Slide! Information Security on the Front Lines Incident Response Procedure
© 2012 Boise State University1 Information Security for Your Office Created By OIT Information Security Services
© 2012 Boise State University1 Click for Next Slide! Information Security for Faculty and Researchers Created By OIT Information Security Services
1 Gramm-Leach-Bliley Act (GLBA) Implementation of the Safeguards Rule Information Security Program University of Minnesota (Adapted from the Federal Trade.
1 Data Handling at Purdue. Section I The Importance of Data Security (slides 4 – 5) Laws and Policies (Slides 7 – 18) - Federal - State - Purdue Section.
Privacy and Information Security Training ( ) Privacy and Information Security Training Vanderbilt University Medical Center Information.
Welcome to the SPH Information Security Learning Module.
Awareness - Protecting our Data Personally Identifiable Information (PII)
Identity Theft Deter, Detect, and Defend At Home & At Work.
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Personal Information Security Workshop Williams College Office for Information Technology (OIT) Winter 2010.
HIPAA Workforce Training The Health Insurance Portability & Accountability Act (HIPAA) requires that the University train all workforce members about the.
Objective 7.03 Understand ways to avoid identity theft. Identity Theft.
1 Red Flag Rules: What they are? & What you need to do Employee Training for Identity Theft : “RED FLAG RULES” February 2010.
University Services. Agenda Technology Support Data Privacy and Security Software and Hardware Discounts for U of M Staff.
Boston Springfield Albany Enter Presentation Title Here Presenter Name © 2009 Wolf & Company, P.C. Presentation date Location 1 Boston Springfield Albany.
Virginia Department for Aging and Rehabilitative Services.
© 2012 ARTHUR J. GALLAGHER & CO. Agricultural Co-Ops: The Challenges of Protecting Data Today Cyber, Privacy & Network Security GALLAGHER CYBERRISK SERVICES.
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
How to protect your laptop, smartphone & other mobile devices CYBER SECURITY ON THE GO TCU Information Security Services.
HIPAA Security Awareness What You Need To Know. Training Overview This course will discuss the following subject areas: How this training relates to you.
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Mount Auburn Hospital Information Security Awareness Training How to protect electronic information at work and at home.
Red Flag Rules WELCOME Iowa State University Identity Theft Prevention Program.
Introduction to Information Security Office of the Vice President for Information Technology Mr. Corbett Consolvo, IT Security Analyst Ms. Lori McElroy,
1 PCI Compliance Training University of Nevada, Reno Presented by The Controllers Office.
The Payment Card Industry Data Security Standard (PCI DSS)
Learning Module #2 HIPAA and Compliance For Clinical Students and Instructors FVHCA Member Clinical Sites Reviewed
Personal Information Security and Malware Awareness Workshop Bard College at Simons Rock Information Technology Services (ITS) Summer 2012 (Please sign.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
UNIVERSITY OF ALABAMA V HIPAA Privacy and Security Training For Employees Compliance is Everyones Job 1 INTERNAL USE ONLY For UA Health Care Components,
© 2016 SlidePlayer.com Inc. All rights reserved.