We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byZachery Bates
Modified over 2 years ago
1 What is Your Security IQ?
2 Introduction: Exercise
3 Introduction: Learning Objectives Personal: What can I do to protect my personal security? Data: What can I do to help ensure that child support data is protected?
4 Introduction: Learning Objectives Office: What can I do to make my office more secure?
5 Child Support Workers Managers and/or Supervisors Systems Staff Policy Staff IV–D Directors
6 Personal: Benefits of Technology Credit Cards ATMs Smart Cards Online Internet Access
7 Personal: Downside of Technology Credit Cards ATMs Smart Cards Online Internet Access
8 Personal: Increased Access Technology has increased access to personal data
9 Personal: Protection What I can do to protect my personal information?
10 Data: Work How does this relate to our work lives? –NCP data –CP data –Dependent data
11 Data: Information State–wide system –Printouts –Hard files –Correspondence –Diskettes
12 Data: Confidentiality What does it mean to me? –Your State Requirements –Your State Penalties
13 Data: Federal Disclosure §453 & §463 –Who, Why, How and What can be disclosed Know what your limitations are
14 Data: Protection What I can do to protect Child Support Enforcement Program data
15 Office What I can do to protect my physical environment
16 Summary SECURITY IS EVERYONE’S RESPONSIBILITY!
17 Security Action Plan What are you going to do now?
When Im at work: Solving problems. Have you had a problem at work? Do you wish you had handled it better? 2.
1 of 19 How to invest in Information for Development An Introduction IMARK How to invest in Information for Development An Introduction © FAO 2005.
Powered by SmartPros Powered by: SmartPros Title Slide ADP LUNCH & LEARN CPE PROGRAM Protecting Your Data Is More than a Good Idea - It's the Law Authored.
1 Welcome to the Title I Annual Meeting for Parents
1 of 19 Organization and Management New Approaches to motivating Staff IMARK Investing in Information for Development Organization and Management New Approaches.
The Legal Foundation TRICARE Management Activity HEALTH AFFAIRS 2009 Data Protection Seminar TMA Privacy Office.
2 1.Client protection principles 2.Principle #6 in practice 3.The client perspective 4.Participant feedback 5.Tools for improving practice 6.Conclusion.
Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?
Army Personnel Survey Office, U.S. Army Research Institute Sample Survey of Military Personnel Slide 1, 27 Jun 01 Findings on BOSS Fall 2000 Sample Survey.
GETTING IT RIGHT. Today we will - review or refresh your approach to making funding bids by: Not sure? Ask! And this is to remind me and you please to.
Personal Accountability for Data Stewardship 1 st Year Medical Students – October 18, nd Year Medical Students – October 9, 2012 Noella RawlingsRichard.
Training Guide Gaining Senior Leadership Support for Continuity of Operations.
Friday 13th March 2009 Our Christian family-safe, happy, caring, valued, special. 1 E-safety at Medlar- with-Wesham CE Primary School Denise Hollowell.
SMART GOALS The First Step Toward Improvement Dr. Anne Zeman, Director Curriculum and Professional Learning September 22, 2011.
1 606 CMR 14.00: Background Record Checks What you need to know!
1 of 17 Information Strategy The Features of an Information Strategy © FAO 2005 IMARK Investing in Information for Development Information Strategy The.
Using Family Connection Online Resource for Planning & Advising.
1 Disability-Related Information: Asking, Telling, Using and Storing Presented by Denise Sudell, Esq. Senior Policy Advisor, Disability Issues USDOL, Civil.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
1 HIPAA AWARENESS TRAINING ND Department of Health March 2003.
1 Gramm-Leach-Bliley Act (GLBA) Implementation of the Safeguards Rule Information Security Program University of Minnesota (Adapted from the Federal Trade.
Security Beyond the Firewall Protecting Information in the Enterprise.
The Harnessed Atom Lesson Nine Energy And You. What you need to know about Energy Decision-making: Standard of living Economics – Supply and demand Informed.
1 The Indiana Department of Correction presents New Employee Orientation: Performance Management.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Tenth Edition Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall.
1 ON- LINE TRAINING EVENT HIPAA (Health Insurance Portability & Accountability Act) ENTER.
Slide 1 Information Protection Policies Training for MGH/MGPO Protecting Our Patients Privacy is EVERYONES responsibility Massachusetts General Hospital.
1 of 13 Organization and Management Information Management in Your Organization IMARK Investing in Information for Development Organization and Management.
An eStrategy for Universities & Colleges Richard Spencer Executive Director, eBusiness ITServices University of British Columbia Vancouver, BC Canada PORTALS.
© 2016 SlidePlayer.com Inc. All rights reserved.