Information Security Office

Slides:



Advertisements
Similar presentations
H = P = A = HIPAA DEFINED HIPAA … A Federal Law Created in 1996 Health
Advertisements

Symantec 2004 Pulse of IT Security in Canada Volume II Survey shows Increases in Concern and Spending for IT Security Andrew Bisson Director, Planning.
JCAHO –A HIPAA Business Associate National HIPAA Summit
Support program for SME IP activity in Japan Naohiko YOKOSHIMA WIPO forum on intellectual property and small and medium-sized enterprises 13 September.
Mobile Security George Bailey Information Security Ivy Tech Community College of Indiana Tech Day 2006, Columbus, IN.
HIPAA AWARENESS TRAINING
HIPAA Health Insurance Portability and Accountability Act of 1996
Mobile Device Security and Control NSAA IT Conference and Workshop Fourth Session: 2:45pm – 4:00pm _____________________________________.
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
The Office Procedures and Technology
COMPLYING WITH PRIVACY AND SECURITY REGULATIONS Overview MHC Privacy and Security Committee Revised 1/17/11.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Copyright Critical Software S.A All Rights Reserved. COTS based approach for the Multilevel Security Problem Bernardo Patrão.
Hart District Acceptable Use Policy Acceptable Use Policy.
Mobile Devices and Wireless Tracy Jackson Liz Nenni Matt Hinson Chris Eiben.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking – Slide 1 Funded by a grant from Take Charge America,
Springfield Technical Community College Security Awareness Training.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
Privacy (or Data) Breaches - Examples South Carolina Department of Revenue Hackers got into the SCDOR’s computers, and stole information on up to 3.2 Million.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Data Classification & Privacy Inventory Workshop
Security Controls – What Works
New Data Regulation Law 201 CMR TJX Video.
Protecting Sensitive Information PA Turnpike Commission.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
Securing Information in the Higher Education Office.
Electronic Public Record What is it, and Where Can Agency Lawyers Find It?
HIPAA Privacy & Security Kay Carolin Barbara Ann Karmanos Cancer Center March 2009.
Dr.Backup Online Backup Service (888) (toll free)
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
 Information technology is defined as the use of computer hardware and software to manage information.  Six functions of data management: Convert.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Instructional & Information Technology Services Fall, Activities and Updates Teresa Macklin Information Security Officer Information Security.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
The State of Computer & Data Security in Corporations Independent Survey.
Topic 5: Basic Security.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
Incident Security & Confidentiality Integrity Availability.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Protecting PHI & PII 12/30/2017 6:45 AM
Add video notes to lecture
E&O Risk Management: Meeting the Challenge of Change
Protection of CONSUMER information
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Red Flags Rule An Introduction County College of Morris
HIPAA & PHI TRAINING & AWARENESS
Move this to online module slides 11-56
Property Control Asset Forms
School of Medicine Orientation Information Security Training
Presentation transcript:

Information Security Office Riverside County Information Security Office

Laptop Theft: How Serious? More than 600,000 laptop thefts occur annually, totaling an estimated $720 million in hardware losses and $5.4 billion in theft of proprietary information. Safeware Insurance, 2003 According to Gartner, the chances of a laptop being stolen this year are 1 in 10. Gartner Group, 2002 Gartner estimates approximately 70% of all laptop thefts are internal. Gartner Group, 2002 Laptop theft has been attributed to 59% of computer attacks in government agencies, corporations, and universities during 2003. Baseline, 2004 80% of those surveyed acknowledged financial losses due to computer breeches. CSI/FBI Computer Crime and Security Survey, 2002 97% of stolen computers are never recovered. FBI Nearly 40 percent of victims do not report computer intrusions. CSI/FBI Computer Crime and Security Survey, 2005 81% of companies surveyed “reported the loss of one or more laptops containing sensitive information during the past 12 months.” “Data Loss Common for US Firms” PC World, August 17th, 2006

Data Theft: How Serious? 67.7% of respondents report the estimated value of proprietary data on their stolen computing device at $25,000 or less; 9.2% estimated the value at $1,000.000 or more and 2.3% estimated the value at more than $10,000,000. The value of proprietary data on respondents stolen Computers averaged $690,759.61 per stolen Computer. 45.6% of respondents report other items were stolen at the time of the Computer theft, with removable media (including spare disks, stored files on CDs, removable media and spare hard drives) accounting for 21.8% of the additional stolen items. Average total replacement cost of stolen computing devices was $14,227.27 per device. This does not include the cost of the data on the computing device. 2003 BSI Computer Theft Survey

It’s not the Laptop – It’s the Data!

What’s an Identity Worth? 208 Identity Incidents this year September, 2006: Telesource – 11 SEP 06 (Social Security numbers and other personal information found in dumpster) Cleveland Clinic (Florida) – 8 SEP 06 (Social Security numbers, dates of birth, addresses and other details of 1,100 patients stolen) University of Minnesota – 8 SEPT 06 (Personal information of 13,084, including 603 Social Security numbers, on stolen computers) Linden Lab / Second Life – 8 SEP 06 (Names, address, and payment information of almost 650,000 on hacked server) BMO Bank of Montreal – 8 SEP 06 (Stolen laptop contains personal data for about 900 clients) Florida National Guard – 7 SEP 06 (Social Security numbers of up to 100 soldiers on stolen laptop) Chase Card Services – 7 SEP 06 (Tapes with information on over 2.5 million Circuit City cardholders thrown in trash) Transportation Security Administration – 6 SEP 06 (Social Security numbers and birth dates of 1,195 mailed to wrong addresses) Wells Fargo – 1 SEP 06 (Social Security numbers and names of Wells Fargo employees on stolen laptop) City of Chicago / Nationwide Retirement Solutions – 1 SEP 06 (38,443 names, addresses, Social Security numbers, and dates of birth on stolen laptop) Virginia Commonwealth University – 1 SEP 06 (Names, Social Security numbers, and email addresses of 2,100 exposed online) 3,206,922 – Just in September.

ISO Policy “Hardware & Software Control” ...[A]ll hardware and software shall be obtained from or authorized by the department head or their designated agent. This includes equipment such as Servers, PCs, Laptops, Printers, Cell Phones, Radios, PDAs, Telephones, portable media such as USB drives, CD-ROMs, CDRWs, DVDs, DVRs, [and] Software. Department heads or their designated approving agent will authorize the adding of any networked component that is connected either directly to the County’s Wide-Area-Network, indirectly connected via a Local-Area-Network segment, or attached to an existing system.

Board Policy H-26 Board Policy H-26: “As a minimum, departments will track laptop computers, and high-end cell phones, PDA’s and GPS receivers.” “Any device used to store sensitive data or connect to the county’s network will be tracked […]”

But what is Sensitive Data? HIPAA, Privacy Act, Personnel Data California Public Records Act California Government Code 6254.9 What about data that’s not covered?

Data Classification Policy ISO Proposed Board Policy Categorizes Public vs. Sensitive Data Defines categories of Sensitive Data Restricted Data Private Protected Intellectual Property Defines who decides what’s public and what’s sensitive. Defines who owns the data Still in work; under review by County Counsel

Theft or Loss Policy Many departments have no policy or procedures on the theft of loss of IT equipment or the data it may contain ISO Proposed Board Policy In the event of theft or loss, the employee must immediately notify the: Applicable Law Enforcement Agency (in the case of theft). Department ITO In all cases, Department must notify: Information Security Office Auditor-Controller’s Office Still in work; under review by CISO

What about Personally Owned Devices? Personally owned devices expand and blur the County’s information borders Introduces new entry points for hackers, viruses, and other dangers. In general, use of personally owned devices should be prohibited If a county employee needs a tool for a job, the county should provide it. Most uses of personally owned devices is for the users convenience – not the good of the County

What if a Department wants to allow Personally Owned Devices? See last slide – don’t! Department head is ultimately responsible for permitting use of Personally Owned Devices Authorization in writing List all required safeguards List any limits to it’s use Record specific acknowledgement that any county related information on the device belongs to the County

Questions?