Critical Data Management Indiana University HR Summit April 24, 2014.

Slides:



Advertisements
Similar presentations
Protect Our Students Protect Ourselves
Advertisements

FERPA: Family Educational Rights and Privacy Act
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
HIPAA Health Insurance Portability and Accountability Act of 1996
COMPLYING WITH PRIVACY AND SECURITY REGULATIONS Overview MHC Privacy and Security Committee Revised 1/17/11.
Employee Self-Service (ESS). Agenda Introduction 1 Terminology 2 Employee Self-Service Components 3 More Information 4 Questions & Answers 5.
Welcome to the SPH Information Security Learning Module.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
HIPAA Privacy Training Your Name Here. © 2004 MHM Resources Inc.2 HIPAA Background Health Insurance Portability and Accountability Act of 1996.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Information Privacy and Compliance Training For All Brigham Young University– Idaho Employees.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
1 The University of Texas at Tyler Protecting the Confidentiality of Social Security Numbers UTS165 Information Resources Use and Security Policy.
SIU School of Medicine Identity Protection Act and Associated SIU Policy.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Complying with Privacy to Enable Innovation & Research
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
The Privacy Office U.S. Department of Homeland Security Washington, DC t: ; f: Safeguarding.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
1 GRAND VALLEY STATE UNIVERSITY FAMILY EDUCATIONAL RIGHTS & PRIVACY ACT (FERPA) TRAINING OFFICES OF THE REGISTRAR AND UNIVERSITY COUNSEL JANUARY 20, 2009.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Harvard Human Subjects Payments Policy Effective 1/1/11 1.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Protecting Sensitive Information PA Turnpike Commission.
Data Access and Data Sharing KDE Employee Training Data Security Video Series 2 of 3 October 2014.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
© 2003 SHRM SHRM Weekly Online Poll: March 9, 2004 QOTW - Identity Theft Analyzing 340 responses of s sent, 1628 received (response rate = 20.9%).
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Ames Laboratory Privacy and Personally Identifiable Information (PII) Training Welcome to the Ames Laboratory’s training on Personally Identifiable Information.
Next ETCH Confidentiality and HIPAA Annual Review What you need to know. The Privacy Rule 1.
Privacy and Information Management ICT Guidelines.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
SPH Information Security Update September 10, 2010.
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
By: Asfa Khan and Huda Mukhtar
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Government Agency’s Name April Identity Theft is when someone steals your personal information and uses it as their own, usually for some financial.
IU Data Protection & Privacy Tutorial. 1 Overview As an employee of Indiana University, YOU have a responsibility to protect the data you come in contact.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
DON Code of Privacy Act Fair Information Principles DON has devised a list of principles to be applied when handling Protected Personal Information (PPI).
Ticket Training Tuesday Properly Safeguarding Personally Identifiable Information (PII)
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
2015Computer Services – Information Security| Information Security Training Budget Officers.
HIPAA Privacy What Every Staff Member Needs to Know.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Information Security Awareness Training
Protect Our Students Protect Ourselves
HIPAA Privacy and Security
Protecting PHI & PII 12/30/2017 6:45 AM
Privacy and Security Basics for CDSME Data Collection
Privacy & Confidentiality
Disability Services Agencies Briefing On HIPAA
Welcome to the SPH Information Security Learning Module
HIPAA Overview.
Good Spirit School Division
Family Educational Rights and Privacy Act of 1974
Presentation transcript:

Critical Data Management Indiana University HR Summit April 24, 2014

INDIANA UNIVERSITY University Human Resources

Classifications of data IU has four classifications of data that define the access, handling, and the proper disposal of data.  Public  University Internal  Limited Access/Restricted  Critical INDIANA UNIVERSITY University Human Resources

Data Classified as Public Open access (except CANNOT be used for commercial purposes) Examples of HRMS data classified as Public:  Name  Job Title  Salary/Wages  Work address & phone  Dates of first and last employment INDIANA UNIVERSITY University Human Resources

Data Classified as University Internal Accessible by eligible employees in order to conduct university business. Examples of HRMS data classified as University Internal:  University ID (employee ID)  Preferred name  Compensation frequency  IU Job funding account numbers INDIANA UNIVERSITY University Human Resources

Data Classified as Limited Access/Restricted Requires high level of protection and specific authorization. Selective access may be granted. Examples of HRMS data classified as Limited Access/Restricted:  Date of birth/Age  Gender  Ethnicity  Home address/home phone  Benefit enrollment information  Payroll information (taxes, deductions, etc.)

Data Classified as Critical Requires the very highest level of protection. Specific authorization required. HRMS data classified as Critical:  Social Security Number  Direct deposit bank account numbers

INDIANA UNIVERSITY University Human Resources

Inappropriate handling of Critical data can result in: Criminal or civil penalties  2 Indiana state laws exist related to unauthorized disclosure of SSN and insecure disposal of personal information Identity theft or personal financial loss Invasion of privacy

Unauthorized disclosure of Critical data If at any time you think you may have had an unauthorized disclosure or exposed any Critical information, please immediately:  Call your Support Center or Network Operations Center  Send details to

Highlights from: “Protecting Red-Hot Data” Flippy book can be found here: training/downloads training/downloads “Staying Safe Online” bookmark: iles/StaySafeOnlineBookmark.pdf

Safeguarding data Don’t be a phishing scam victim. Reputable organizations will never ask for personal data, account numbers, or passwords via . Don’t open files from strangers and ensure that files from friends are legitimate. Use strong passphrases: include combos of lower and uppercase letters, numbers, and symbols.

Safeguarding data NEVER share passwords or passphrases. ALWAYS log off or lock your workstation when you step away, even for a moment. Use VPN as often as possible when using public Wi-fi. Access HRMS employee data only in the conduct of university business.

Safeguarding data Respect the confidentiality and privacy of individuals whose records you may access. Do not access or use any HRMS data for your own personal gain or profit, or the personal gain or profit of others, or to satisfy your personal curiosity. Observe any ethical restrictions that apply to data to which you have access, and abide by applicable laws or policies with respect to access, use, or disclosure of information.

Collecting Critical or Limited Access/Restricted data Do not collect it unless absolutely required for business need Utilize university ID instead of SSN where possible If you received the information from another source, DIRECT THE SOURCE not to provide it to you anymore and DISPOSE of it securely

Storing Critical or Limited Access/Restricted data Electronic: Always store on secure departmental servers  NEVER store this information on your desktop, PDA, USB drive, or any mobile device unless you have written approval from your unit AND the information is encrypted on the device

Storing Critical or Limited Access/Restricted data Paper: Ensure that records are kept in locked file cabinets/storage rooms that are access controlled

Sharing Critical or Limited Access/Restricted data Do not disclose except as specifically required by your job responsibilities Reduce risk by providing the minimal amount of information required to meet the business need. Do not provide this data when someone requests it in person, in writing, or by phone unless you have secured approval due to it being required or allowable by law or policy.

Sharing Critical or Limited Access/Restricted data Paper:  Hand deliver  Use reliable transport or couriers (Purchasing maintains a list)

Sharing Critical or Limited Access/Restricted data Electronic:  Do not send via unless absolutely required for business need  If required, add the word “Confidential” to the subject line so the file will be encrypted if it leaves the IU network (Cisco Registered Envelope Service)  To share files, use Slashtmp:

Retaining Critical or Limited Access/Restricted data Retain only as long as is required for business or compliance needs

Disposing of Critical or Limited Access/Restricted data Paper:  Shred (Purchasing has a list of approved document destruction vendors) Electronic:  Delete files containing “critical” data as soon as business need is fulfilled  If disposing of hard drive, IU policy requires wiping or destroying prior to disposal or transfer outside the university

Proper use and handling of university data is EVERY employee’s responsibility!

Summary Safeguard university data like it’s your own Collect only what is absolutely required Store securely Share only what is required and use a secure method for sharing Retain only as long as needed Dispose using best practice tools and techniques

Remember - don’t be Dave!

Questions?