Data Security Julie D. Wilson Sr

Slides:



Advertisements
Similar presentations
University of Minnesota
Advertisements

ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Red Flag Rules: What they are? & What you need to do
© Chery F. Kendrick & Kendrick Technical Services.
Identity Theft Prevention Program Red Flags Rules Fighting Fraud at Montana Tech.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
HIPAA Regulations What do you need to know?.
Massachusetts privacy law and your business  Jonathan Gossels, President, SystemExperts Corporation  Moderator: Illena Armstrong  Actual Topic: Intersecting.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
Protecting Personal Information Guidance for Business.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Allison Dolan Program Director, Protecting PII Handling Sensitive Data - WISP and PIRN.
© Chery F. Kendrick & Kendrick Technical Services.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
2015 ANNUAL TRAINING By: Denise Goff
HIPAA PRIVACY AND SECURITY AWARENESS.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
ISO27001 Introduction to Information Security. Who has day-to-day responsibility? All of us! Why Information Security? Control risk, limit liability What.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
© Copyright 2010 Hemenway & Barnes LLP H&B
Data Breach: How to Get Your Campus on the Front Page of the Chronicle?
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Michael Wright • Chief Security Officer • Tech Lock
Performing Risk Analysis and Testing: Outsource or In-house
An Update on FERPA and Student Privacy
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
When to share and not to share information
Protection of CONSUMER information
Security Standard: “reasonable security”
Data Compromises: A Tax Practitioners “Nightmare”
Post-Secondary Institution Data-Security Overview and Requirements
General Data Protection Regulation
Chapter 3: IRS and FTC Data Security Rules
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Agenda Introduction Why is cybersecurity important? Laws & Regulations
Scott McGlynn, Marketing & Content Manager
Protecting Personal Information Guidance for Business.
Red Flags Rule An Introduction County College of Morris
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Disability Services Agencies Briefing On HIPAA
Current Privacy Issues That May Affect Your Credit Union
Protecting Student Data/ Financial Aid Data Sharing
County HIPAA Review All Rights Reserved 2002.
CompTIA Security+ Study Guide (SY0-401)
Finham Primary School – GDPR Practice Guidelines
Identity Theft Prevention Program Training
UCA Gramm-Leach Bliley Act (GLBA) Safeguards Rule Compliance Training Effective June 12, 2018 Adapted from materials published by the Federal Trade Commission.
Compliance and Audit Practices within the Financial Aid Office
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
EASFAA Annual Conference Portland, ME May 6, 2019
Colorado “Protections For Consumer Data Privacy” Law
Getting the Green Light on the Red Flags Rule
Information Technology Organization Overview RFP #220-05
School of Medicine Orientation Information Security Training
Presentation transcript:

Data Security Julie D. Wilson Sr Data Security Julie D. Wilson Sr. ERP Financial Aid Analyst Dynamic Campus TASFAA 2019

AGENDA Overview of Graham-Leach-Bliley Act (GLBA 2002) and General Data Protection Regulation (GDPR, May 2018) Who needs to be concerned about data security? What data needs protecting and where is it? What are the requirements? Why is this coming up now? What constitutes a data breach and how to handle them? Planning and Implementation Resources. TASFAA 2019

Graham-Leach-Bliley Act (GLBA 2002) Because FA administers the Direct Loans, IHEs are subject to the GLBA. The GLBA requires the following: Designated person or group to coordinate security program. Identify reasonably foreseeable internal/external risks to data security. Control risks identified and regular testing of controls. Take reasonable steps to select service providers who adhere to security safeguards. TASFAA 2019

General Data Protection Regulation (GDPR) GDPR is NOT required for compliance here. However, if you have international students from European countries, compliance is required beginning May 2018. Encryption methods on servers, storage, media, networks. Strong key management Adhere to the students’ ‘right to be forgotten’ Verify legitimacy of user identities and transactions. Ensure data accuracy. Minimize student identity exposure. Implement data security measures. TASFAA 2019

Who Needs to be Concerned About Data Security? President, VP, Senior Administration, Board CIO/CISO Registrar, Financial Aid, Finance Faculty, Staff, Students EVERYONE! Your president and everyone with access to COD, NSLDS, FAA, and CPS agrees to adhere to GLBA on the PPA and every time you log in to these systems. TASFAA 2019

What data needs to be protected? Personally Identifiable Information (PII) Full Name Date of Birth (DOB) Social Security Numbers (SSN) Bank Accounts Any data elements that when combined can be linked back to a specific person. TASFAA 2019

Where is data that needs protecting? Systems: SIS, ERP, Data Management Paper and Imaged Files Forms and Applications Reports Transmissions Identification Cards Paper checks, credit cards, statements Check Stubs, W2s, 1098s Desks, phones, emails, etc. TASFAA 2019

Why Now? At the 2017 FSA Conference it was announced that as part of the annual A133 audit for 2018, IHEs must include the Data Security Assessment Report. The report must include the following: Identify the person/group responsible for data security program. Identify reasonably foreseeable internal/external risks to data security via formal documented risk assessments of employee training/management; information systems, storage, transmission, and disposal; detection, preventing, and responding to attacks. Control risks identified and regularly test/monitor effectiveness. Ensure that servicers have a security program. TASFAA 2019

Identify the Person/Group for Data Security Program GDPR requires that ONE person at the senior administration level be responsible for Data Security. Group/Team should include: Financial Aid, Records/Registrar, Institutional Research, Information Technology, AR, HR. Whoever has access to sensitive data. Produce Data Security Assessment Report of issues found. Enforce data security protocols. TASFAA 2019

Identify Risks to Data Security Common risks: Community printers: Can items be printed from the history? Personal devices with institutional email, data, reports, etc. Insufficient security classes in Colleague, imaging, etc. Insufficient controls for internal/external networks. Password sharing. Paper files. TASFAA 2019

Control Risks Identified Perform penetration tests and correct issues identified. Training to reduce and eliminate user scams (phishing attacks, password sharing, etc.) Develop security classes to make data ‘need to know.’ Employ automatic log out on campus computers. Develop policies and procedures to address personal devices, institutional information, document destruction, etc. Employ mandatory training for all users. Include students in any data security plan. TASFAA 2019

Ensure Servicers Have a Security Program Third party services must be GLBA compliant. Shred companies, debit cards, bookstore, cafeteria, etc. Review the contract: Does it address data security protections. Are they insured for breaches? How will they notify you of a breach? If they have a breach, you’ve had a breach! Report it! TASFAA 2019

Reminder about ‘Red Flag’ rules? FTC Identity Theft Red Flag Rules (2007) Detection of Identity Fraud/Theft Prevention of Identity Fraud/Theft Response to suspected Identity Fraud/Theft TASFAA 2019

What is a Data Security Breach? GLBA defines a breach as data: Disclosure Misuse Alteration Destruction Other compromise of data/information No minimum record count. Applies to all records, electronic and paper. Storage, transit, and processing. Your third party vendors (if they had a breach, you had a breach). TASFAA 2019

TASFAA 2019 Breach Reporting SAIG agreement requires breaches be reported ON THE DAY OF DETECTION or SUSPICION. No minimum number of files. Not just electronic files. Report first, investigate further after. DOE can levy fines of up to $54,789 per violation if the IHE does not comply with self-reporting requirements. Million dollar liability insurance covers approximately 18 compromised records not reported. TASFAA 2019

TASFAA 2019 Resources FTC Red Flag Rules https://www.ftc.gov/tips-advice/business-center/guidance/fighting-identity-theft-red- flags-rule-how-guide-business Federal Student Aid Cybersecurity Compliance Information https://ifap.ed.gov/eannouncements/Cyber.html FSA Postsecondary Institution Data Security Overview & Requirements https://fsaconferences.ed.gov/conferences/library/2017/2017FSAConfSession37.ppt 16 CFR 314.4 (b) https://www.gpo.gov/fdsys/pkg/CFR-2003-title16-vol1/pdf/CFR-2003-title16-vol1- sec314-4.pdf TASFAA 2019

Questions TASFAA 2019

Thank you. Julie D. Wilson Sr Thank you! Julie D. Wilson Sr. ERP Financial Aid Analyst Dynamic Campus Julie.Wilson@dynamiccampus.com TASFAA 2019