We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byMolly Muriel
Modified over 2 years ago
© 2012 Boise State University1 Click for Next Slide! Information Security for Faculty and Researchers Created By OIT Information Security Services
© 2012 Boise State University2 Click for Next Slide! Information Security for Faculty & Researchers Role of Information Security Office State and Federal Law Boise State Policy Definitions: Personal Data Institutional Data Public Data Intellectual Property Research Data Copyrighted Materials Confidential Information Best Practices for Protecting Information
© 2012 Boise State University3 Click for Next Slide! State and Federal Law Alphabet Soup... FERPA HIPAA PCI-DSS GLBA SOX Red Flag Alerts DMCA Idaho Code § §28-51-
© 2012 Boise State University4 Click for Next Slide!... And Boise State Policy Information Technology Resource Use (8000) Information Privacy and Security (8060) University Records and Archives (1020) Non Discrimination and Anti-Harassment (1060)
© 2012 Boise State University5 Click for Next Slide! Personal Data Your own sensitive information stored on MyBoisestate, Broncomail or in your office Name Address Social Security Number Banking Information Insurance Information Family Information
© 2012 Boise State University6 Click for Next Slide! Institutional Data Any data that is subject to state or federal regulation, data that is required to be protected by contractual obligation, as well as all data created, collected, maintained, recorded or managed by the university, its staff, and agents working on its behalf. It includes data used for planning, managing, operating, controlling, or auditing university functions; especially data used by multiple university units; and data used for university reporting. University data also includes research data that contains personally-identifiable subject information, or proprietary university information and trade secrets From: Boise State Data Classification StandardBoise State Data Classification Standard
© 2012 Boise State University7 Click for Next Slide! Public Data Information that is available through open records requests While public information is generally available for viewing by the public, certain rules and conventions apply about how and when the information may be viewed.
© 2012 Boise State University8 Click for Next Slide! Intellectual Property Information developed through non-sponsored research: May be stored in computers, on media, in printed form, etc. May be copyrightable May generate income May be subject to laws and/or policies Intellectual Property Policy (1090)
© 2012 Boise State University9 Click for Next Slide! Research Data Information developed through sponsored research: All the characteristics of non-sponsored research, plus... May be subject to contractual obligations
© 2012 Boise State University10 Click for Next Slide! Copyrighted Materials Applies to printed material as well as audio, video, images and other media Copying or duplicating without permission may have serious legal and/or financial consequences Be aware of peer-to-peer file sharing enabled on your computer
© 2012 Boise State University11 Click for Next Slide! Confidential Data Students, Faculty, Staff, Donors, Contractors Financial Records Grades Credit Card Information Health Care Information Addresses Phone Numbers Insurance Records Social Security Numbers Protected By Law!
© 2012 Boise State University12 Click for Next Slide! Best Practices More Alphabet Soup PII P ersonally I dentifiable I nformation This is the Key Acronym!
© 2012 Boise State University13 Click for Next Slide! Best Practices Safeguard The Information on Your Computer And In Your Office Your Personal Information Student Information Your Research
© 2012 Boise State University14 Click for Next Slide! Best Practices How Can Data be Lost? Laptop or other data storage system stolen from car, lab, or office. Research Assistant accesses system after leaving research project because passwords aren't changed. Unauthorized visitor walks into unlocked lab or office and steals equipment or accesses unsecured computer. Unsecured application on a networked computer is hacked and data stolen.
© 2012 Boise State University15 Click for Next Slide! Best Practices What is the result of lost data? Loss of personal use of a computer Loss of funding Fines Bad Publicity Expose students, staff, contractors, donors to identity theft
© 2012 Boise State University16 Click for Next Slide! Best Practices Protecting Information If you print itgo get it right away Lock up sensitive informationincluding laptops Store sensitive information on file servers Consider whether you really need to store it Shred it if you can Data Retention Standards
© 2012 Boise State University17 Click for Next Slide! Best Practices Protecting Information Use strong passwords Change passwords often Use different passwords on different systems Never share your password Password protect your screensaver Manually lock your screen whenever you leave your desk
© 2012 Boise State University18 Click for Next Slide! Best Practices Protecting Information Be sure your computers operating system and anti-virus software are up-to-date Never open unsolicited from an unknown source or click on unfamiliar web addresses Follow computer salvage proceduresfor disks, too!
© 2012 Boise State University19 Click for Next Slide! Universities in the News! University of Idaho 70,000 Donor Records University of Texas at Austin 225,000 Student Records UCLA 500,000 Student Records
© 2012 Boise State University20 Click for Next Slide! Idaho in the Cybersecurity News But not in a good way! August Idaho Army National Guard A small computer drive containing Social Security numbers and other personal information about every Army National Guard soldier in Idaho has been stolen. 3,400 records Mar. 10, 2007 University of Idaho A data file posted to the school's Web site contained personal information including names, birthdates and Social Security numbers of University employees. 2,700 records Dec. 7, 2005 Idaho State University, Office of Institutional Research ISU discovered a security breach in a server containing archival information about students, faculty, and staff, including names, SSNs, birthdates, and grades. Unknown number of records
© 2012 Boise State University21 Click for Next Slide! University NOT in the News! Boise State University Zero Lost Records So Far! Go Broncos!
© 2012 Boise State University22 Click for Next Slide! What To Do! Know who to call! I think my computer is infected, what do I do? Call the Help Desk I think I lost the USB drive I used to take some sensitive files home to work on, what do I do? Call the Information Security Office
© 2012 Boise State University23 Click for Next Slide! Information Security for Faculty & Researchers Information Security Services Website With links to laws and recommendations for protecting information
© 2012 Boise State University1 Information Security for Your Office Created By OIT Information Security Services
© 2012 Boise State University1 Click for Next Slide! Information Security on the Front Lines Created By OIT Information Security Services
Securing Information in the Higher Education Office.
Best PracticesUSCA Fall 2010: Baylor University3.
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Information Security 2013 Roadshow. Roadshow Outline Why We Care About Information Security Safe Computing Recognize a Secure Web Site (HTTPS) How.
Data Breach: How to Get Your Campus on the Front Page of the Chronicle?
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
New Faculty Orientation to Privacy and Security at UF Susan Blair, Chief Privacy Officer Kathy Bergsma, Information Security.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA Health Insurance Portability and Accountability Act Purpose is to protect clients (patients)
IT Security Essentials Ian Lazerwitz, Information Security Officer.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Desktop 1 Owning the Desktop: Is.edu like.com? Scott Bradner Harvard University University Technology Security Officer 28 June 2006.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Department of Information Systems Brigham and Womens Hospital Laptop Encryption Catherine McGoldrick Schroeder Corp. Mgr, BWH IS Management & Planning.
Protecting Sensitive Information PA Turnpike Commission.
Gaucho Round-Up FAQ’s This presentation covers some of the FAQ’s about campus clean-up day. Presentation #4 2/3/
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Electronic Records Management: What Management Needs to Know May 2009.
Information Security Office Protecting Privacy in the New Millennium © Copyright Melissa Guenther, LLC. All rights reserved. Kelley Bogart – Information.
Information Privacy and Compliance Training For All Brigham Young University– Idaho Employees.
KDE Employee Training. What IS a Data Breach? Unauthorized release (loss or theft) of Sensitive or Confidential Data, such as PII, PHI, etc. On site or.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Information & Communication Technologies NMSU All About Discovery! Risk-Based Information Security Program at NMSU presented by Norma Grijalva.
Financial Services Workshop Margaret Umphrey ECU Information Security Officer March 12, IT Security, East Carolina University.
Rob Walker, May 2008Student Learning Unit Victoria University1 Essay Writing A workshop for ASW 3102: Critical Social Work Theories.
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Springfield Technical Community College Security Awareness Training.
Personal Data Protection and Security Measures Kelvin Lai IT Services - Information Security Team 12 & 13 April 2016.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
IT Security Challenges In Higher Education Steve Schuster Cornell University Copyright Steve Schuster This work is the intellectual property of.
Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
ESCCO Data Security Training David Dixon September 2014.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
A note for you We have created this presentation for you, the outstanding employee who has IT security on the brain. We want to help you spread the word.
COMPLYING WITH PRIVACY AND SECURITY REGULATIONS Overview MHC Privacy and Security Committee Revised 1/17/11.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
© 2017 SlidePlayer.com Inc. All rights reserved.