COMPLYING WITH PRIVACY AND SECURITY REGULATIONS Overview MHC Privacy and Security Committee Revised 1/17/11.

Slides:



Advertisements
Similar presentations
Family Educational Rights and Privacy Act What you should know about FERPA.
Advertisements

FERPA - Sharing Student Information
Protect Our Students Protect Ourselves
FERPA: Family Educational Rights and Privacy Act
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Welcome to the SPH Information Security Learning Module.
FERPA Refresher Training Start. Page 2 of 11 Copyright © 2006 Arizona Board of Regents FERPA Refresher Training What is FERPA FERPA stands for Family.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Springfield Technical Community College Security Awareness Training.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
FERPA: WHAT YOU SHOULD KNOW ILASFAA April 18, 2008 Amy Perrin Director of Financial Aid Elgin Community College.
Critical Data Management Indiana University HR Summit April 24, 2014.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
FERPA: Family Educational Rights and Privacy Act.
FERPA Skidmore College Family Education Rights & Privacy Act What is FERPA? It is the Family Educational Rights and Privacy Act of Is also referred.
1 GRAND VALLEY STATE UNIVERSITY FAMILY EDUCATIONAL RIGHTS & PRIVACY ACT (FERPA) TRAINING OFFICES OF THE REGISTRAR AND UNIVERSITY COUNSEL JANUARY 20, 2009.
What is FERPA? Family Educational Rights and Privacy Act.
2/16/2010 The Family Educational Records and Privacy Act.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
1 FERPA and Student Privacy in Records of University Research ECURE March 1, 2005 Richard Rainsberger, Ph.D. Consultant, Education Records Law and Privacy.
The Family Educational Rights and Privacy Act (FERPA) The Importance of Protecting Student Records This session will help you better understand the law.
IT Security Essentials Ian Lazerwitz, Information Security Officer.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
FERPA 101 Student Records: Institutional Responsibility and Student Rights What Every University Employee Should Know Prepared by the Office of the Registrar.
FERPA REFRESHER AND UPDATE FERPA/Protecting Sensitive Information January 17, 2013 Jesh Humphrey, Senior Associate General Counsel.
FERPA Training. What is FERPA? FERPA (the Family Educational Rights and Privacy Act of 1974), also known as the Buckley Amendment, is a Federal law that.
HIPAA Privacy & Security EVMS Health Services 2004 Training.
Ten Thing IT Staff Need to Know About Education Records Privacy Ten Things IT Staff Need to Know About Education Records Privacy Jeff von Munkwitz-Smith.
Protecting Sensitive Information PA Turnpike Commission.
Data Access and Data Sharing KDE Employee Training Data Security Video Series 2 of 3 October 2014.
FERPA The Family Educational Rights and Privacy Act (FERPA) also known as the Buckley Amendment, passed by Congress in 1974, grants four specific rights.
FERPA at The Catholic University of America Presented by Laura Jacobs Anderson Associate Registrar Office of Enrollment Services.
The Family Educational Rights & Privacy Act (FERPA) Presented by: Diane Mendoza.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
THE FAMILY EDUCATION RIGHTS & PRIVACY ACT (FERPA) Presented by: Robin B. Snyder, Esquire.
FERPA 101 Student Records: Institutional Responsibility and Student Rights What Every University Employee Should Know Prepared by the Office of Academic.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
FERPA: What you Need to Know The Family Educational Rights and Privacy Act & SEI.
FERPA Refresher Training Start. Page 2 of 11 Copyright © 2006 Arizona Board of Regents FERPA Refresher Training What is FERPA FERPA stands for Family.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Family Educational Rights and Privacy Act (FERPA) UNION COLLEGE.
FERPA Basics From the University of Northern Iowa and Office of the Registrar.
 Definitions ◦ A student is any person age 18 or attending an institution of postsecondary education ◦ E ducation records are any records that are related.
0 Managing Student Records Legally and Effectively Tiffany Hogue Provost’s Office Spring 2009.
Special Education 101 Elementary Dept. Chair 1/27/2009 Confidentiality.
Data Breach: How to Get Your Campus on the Front Page of the Chronicle?
Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.
Personal data protection in research projects
FERPA TRAINING Federal Educational Rights and Privacy Act.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT (FERPA) What Faculty and Staff Should Know.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Information Security Awareness Training
Protect Our Students Protect Ourselves
Protecting PHI & PII 12/30/2017 6:45 AM
Protection of CONSUMER information
Welcome to the SPH Information Security Learning Module
Managing Student Records Legally and Effectively
Welcome to the FERPA training for Faculty and Staff.
FERPA For New Faculty Lawrence F. Glick Sr. Associate General Counsel
Family Educational Rights and Privacy Act of 1974
Presentation transcript:

COMPLYING WITH PRIVACY AND SECURITY REGULATIONS Overview MHC Privacy and Security Committee Revised 1/17/11

What Regulations? FERPA-protects privacy of student records Gramm/Leach/Bliley-protects security and confidentiality of customer financial records FACTA-defines appropriate methods of disposing of information from credit reporting agencies Identity Theft (MA 201)-protects personally identifiable information

Question You find a folder in the trash that contains information about a faculty members former advisees, including name, address, Social Security number, date of birth, grades, etc. How do you respond?

What is Confidential Information? Information that identifies or describes the individual, including: Home address and telephone number (when linked with other confidential information) Birth date Social Security number Income tax information Salary information Student academic information

What is PII? Personally identifiable information is held to a higher standard than other personal or confidential information PII is defined as first and last name (or first initial and last name) plus: Social Security Number Drivers license or state ID number Credit or debit card number

What is Directory Information? FERPA permits disclosure of directory information for current students without consent, including: Name Class year and major Home address and telephone number Campus address and telephone number Dates of attendance at Mount Holyoke Previous educational institution most recently attended Honors, awards and participation in sports and activities Heights for athletes

Principles for Working with Confidential Information Use confidential information appropriately Safeguard the information, in both paper and electronic form, from inappropriate uses by practicing safe computing habits

Appropriate Use of Confidential Information Access, use and disclose confidential information only as a legitimate part of your job Do not share confidential information with anyone who does not have a legitimate need to have the information Dispose of confidential information properly

Safeguarding Confidential Information (at work and at home) Keep current on security softwareanti- virus, anti-spyware, bug fixes, patches Passwordsunguessable and changed as appropriate Control accessturn off machine, lock screen, locked file cabinets, secure space, firewall on shared computers

Safeguarding Confidential Information (continued) Transmit, store and dispose of files properly Do not open or save files on computers running peer-to-peer software Do not set browsers to remember passwords or data in forms Do not transmit confidential material via instant messagingits not secure If you have a problem, report it immediately

Working with PII Do not store PII on desktop machines; work only on the server Avoid using PII with portable devices (laptops, flash drives, PDFs); all use must be encrypted If your computer is compromised, unplug it from the network and contact LITS immediately

Question The Colleges student health insurance provider asks you to them a list of participating students, including name, birth date and social security number. How do you respond?

Question An FBI agent comes to your office and begins to question you about an international student. How do you respond?

When Can Confidential Information Be Shared? When there is a legitimate business purpose When you receive a duly executed subpoena from an authorized government agent When you believe that there is imminent danger of death or serious physical injury to someone

Whats Peer-to-Peer File Sharing? Allows users to find and access each others hard drives and to share information directly without a central server Most (but not all) P2P applications involve sharing of music or movies, often in violation of copyright laws

Why is P2P File Sharing a Problem? Violation of copyright laws Slowing or disruption of network Risk of contamination Support costs of restoring contaminated computers

Colleges P2P Policy Use of P2P software by employees on any machine connected to College network is prohibited unless academic or job-related (job-related use includes Skype and other netphone applications) Job-related uses for staff should be cleared with the division head

Some Dos Do use unguessable passwords and change them as appropriate Do shred confidential documents when disposing of them Do use confidential material at home only when absolutely necessary Do be vigilant about protecting computer security

Some Don'ts Dont give anyone else your password or write it down where others can find it Dont share confidential information (with co- workers, with spouses, with friends) Dont work with confidential information on a computer running P2P file sharing software Dont set browsers to remember passwords or data on forms

Responsible Computer Use Policy Comply with laws, regulations and policies Use only authorized resources in an authorized manner Respect privacy of other users Respect the finite capacity of resources

Responsible Computer Use Policy (continued) Do not use resources for personal commercial purposes Do not speak on behalf of the College or use College trademarks/logos unless authorized to do so Be alert to indications that your computer is compromised

Written Policy Statements Employee Confidentiality Statement Working with Confidential Information Employee Use of Peer-to-Peer File Sharing Software Policy on Responsible Use of Computing Resources at Mount Holyoke College All are available on-line on the MHC Policies web page

Question A journalist whose work you admire calls. She is researching a famous alumna and has learned that she was a student intern in your office. The journalist begins asking you questions about your experience with the alumna. How do you respond?

Question You receive the Following message: Date:October 20, 2005 From:Network Administrator To:Mary Jo Maydew Subject:Virus Alert Your machine has been detected on our network with a virus. Please run the following attachment to remove the virus or we will remove your machine from the network. An attachment is included. How do you respond?

Questions/Discussion