Springfield Technical Community College Security Awareness Training.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
Red Flag Rules: What they are? & What you need to do
Identity Theft Prevention Program Red Flags Rules Fighting Fraud at Montana Tech.
Red Flag Identity Theft Training California State University, Fullerton Campus Information Technology Training August 2012.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
Protecting Personal Information Guidance for Business.
Information Privacy and Compliance Training For All Brigham Young University– Idaho Employees.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
University of Minnesota Identity Theft Prevention Program: Red Flags Rule Detecting, Preventing, and Mitigating Identity Theft This presentation was adapted.
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
© 2003, EDUCAUSE Information Privacy: Public Policy and Institutional Policies Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Protecting Sensitive Information PA Turnpike Commission.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
Electronic Records Management: What Management Needs to Know May 2009.
Module #2: What Sensitive Data is and how to handle it Module 2 is approximately 3min and 30 sec.
2005 MASFAA CONFERENCE CHARLESTON, WEST VIRGINIA Ginny D’Angelo Vice President of Student Loans Commerce Bank Diane Lambart Fleming Associate Director.
2015 ANNUAL TRAINING By: Denise Goff
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Next ETCH Confidentiality and HIPAA Annual Review What you need to know. The Privacy Rule 1.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
R ed F lag R ule Training for the Medical Industry © Chery F. Kendrick & Kendrick Technical Services.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
Western Asset Protection
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
1 Identity Theft Prevention and the Red Flag Rules.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Payment Card Industry (PCI) Rules and Standards
HIPAA Privacy and Security
Protecting PHI & PII 12/30/2017 6:45 AM
Protection of CONSUMER information
Chapter 3: IRS and FTC Data Security Rules
Protecting Personal Information Guidance for Business.
Red Flags Rule An Introduction County College of Morris
CompTIA Security+ Study Guide (SY0-401)
Identity Theft Prevention Program Training
Clemson University Red Flags Rule Training
HIPAA & PHI TRAINING & AWARENESS
Move this to online module slides 11-56
Presentation transcript:

Springfield Technical Community College Security Awareness Training

Why? Payment Card Industry (PCI) requirement to provide security training to staff on an annual basis Payment Card Industry (PCI) requirement to provide security training to staff on an annual basis Massachusetts General Law (MGL) 93H Security Breaches; must provide breach notice Massachusetts General Law (MGL) 93H Security Breaches; must provide breach notice Executive Order (EO) 504 requirement to train all employees in safeguarding personal information Executive Order (EO) 504 requirement to train all employees in safeguarding personal information Federal Trade Commission Accurate Credit Transactions Act of 2003 (Red Flag Rules) Federal Trade Commission Accurate Credit Transactions Act of 2003 (Red Flag Rules) Gramm-Leach-Bliley Act Protection of financial information Gramm-Leach-Bliley Act Protection of financial information Family Educational Rights and Privacy Act (FERPA) Family Educational Rights and Privacy Act (FERPA) Health Insurance Portability and Accountability Act (HIPAA) Health Insurance Portability and Accountability Act (HIPAA)

What is personal information? Personal information is defined (MGL 93H) as: Personal information is defined (MGL 93H) as: A resident’s first name and last name or first initial and last name, in combination with any one or more of the following: A resident’s first name and last name or first initial and last name, in combination with any one or more of the following: - Social Security number - Driver’s license number - State issued ID number - Financial account number

PCI Requirements  Credit card numbers should not be stored on campus  The transmission of credit card number information should be treated with the utmost sensitivity

Red Flag Rules  Red Flag = a pattern, practice, or specific activity that indicates the possible existence of Identity Theft  Identity Theft = a fraud committed or attempted using the identifying information of another person without authority.

Red Flags at STCC: 1.Documentation appears to have been altered or forged 2.The photograph/ description is inconsistent with the student holding the ID 3.Documentation inconsistent with existing student information 4.A request made from a non-College issued account 5.A request to mail something to an address not listed on file 6.Notice received regarding possible identity theft 7.Information inconsistent with current information 8.Information inconsistent with other information source 9.Same Information as shown on known fraudulent documents 10.Same Social Security Number as is used by another student

Red Flags Responses at STCC: 1.Deny access to the covered account 2.Gather information to attempt to authenticate/ determine if attempted transaction was fraudulent or authentic 3.Contact the student 4.Change any passwords, security codes or other security devices that permit access 5.Notify and cooperate with law enforcement 6.Notify any credit reporting agency or third party, if applicable 7.Determine no response is warranted under particular circumstances

Maintain, Safeguard Personal Information Collect minimum quantity of information Collect minimum quantity of information Only access information necessary for the proper performance of your job Only access information necessary for the proper performance of your job Disclose only on a “need to know” basis Disclose only on a “need to know” basis If you receive a request for personal information outside the normal course of program management, escalate the request before responding If you receive a request for personal information outside the normal course of program management, escalate the request before responding

Maintain, Safeguard Personal Information (cont.) Beware of non-authorized people seeking information, through: Phishing Phishing Impersonation Impersonation Shoulder surfing Shoulder surfing Desk/dumpster retrieval Desk/dumpster retrieval

Maintain, Safeguard Personal Information (cont.) Destroy personal information when no longer needed Destroy personal information when no longer needed Each network device is an entry point into the College’s network Each network device is an entry point into the College’s network Ensure publically accessible terminals are used in an authorized manner Ensure publically accessible terminals are used in an authorized manner Each STCC computer is related to an identity on the network Each STCC computer is related to an identity on the network

Additional Security Measures Create strong passwords Create strong passwords Strong Password: 3BM3BMShtr! Weak Password: password Periodically change passwords Periodically change passwords Requests for additional access must be approved by supervisors and/or by IT Department Requests for additional access must be approved by supervisors and/or by IT Department

Physical Access Avoid displaying confidential information on desk or computer monitor Avoid displaying confidential information on desk or computer monitor Lock confidential information in a secure location Lock confidential information in a secure location Store confidential information only on network drives Store confidential information only on network drives

Other Security Reminders Treat all payment information confidentially Treat all payment information confidentially Do not customer payment information Do not customer payment information Do not download any sensitive information onto laptops, removable disks, flashdrives, etc. Do not download any sensitive information onto laptops, removable disks, flashdrives, etc. Properly secure sensitive information before leaving your desk (lock computer!) Properly secure sensitive information before leaving your desk (lock computer!) Log out when you leave for the day Log out when you leave for the day Secure laptops that have Virtual Private Network (VPN) access to the College environment Secure laptops that have Virtual Private Network (VPN) access to the College environment Use common sense! Use common sense!

Data Breach Definition: The release of secure, personally identifiable information (PII), to an unintended audience. Definition: The release of secure, personally identifiable information (PII), to an unintended audience. Information security laws Information security laws Data breach notification laws Data breach notification laws

Data Breach – How does it happen? ~98% of data breaches involve electronic information Hackers Hackers Malicious insiders (ex. disgruntled employees) Malicious insiders (ex. disgruntled employees) Theft of a device (laptop, pc, thumb/ flash drive, or other storage media) Theft of a device (laptop, pc, thumb/ flash drive, or other storage media) Through the fault of a 3rd party vendor working with the institution Through the fault of a 3rd party vendor working with the institution By the untrained employee By the untrained employee

Reporting Security Incidents Change your password immediately and report the incident to the IT Help Desk for assistance for additional access blocking/ review Change your password immediately and report the incident to the IT Help Desk for assistance for additional access blocking/ review Report loss/theft of door key/ swipe card immediately to Campus Security Report loss/theft of door key/ swipe card immediately to Campus Security

Shared Responsibility It is our combined responsibility to prevent data breaches from occurring. It is a costly mistake; the information compromised could be your own. Please take precautions to protect sensitive data in your work environment.

Additional Information Security Resources: (College’s IT web site) (College’s IT web site) (web site for Educause, whose mission is to promote the intelligence use of information technology) (web site for Educause, whose mission is to promote the intelligence use of information technology) (information on cyber security for Commonwealth Higher Education institutions) (information on cyber security for Commonwealth Higher Education institutions) “Stop. Think. Stay Connected. Stay Safe Online” “Stop. Think. Stay Connected. Stay Safe Online”