Data Access and Data Sharing KDE Employee Training Data Security Video Series 2 of 3 October 2014.

Slides:



Advertisements
Similar presentations
Protect Our Students Protect Ourselves
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
Gaucho Round-Up FAQ’s This presentation covers some of the FAQ’s about campus clean-up day. Presentation #4 2/3/
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
HIPAA Privacy Training Your Name Here. © 2004 MHM Resources Inc.2 HIPAA Background Health Insurance Portability and Accountability Act of 1996.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
HIPAA Health Insurance Portability and Accountability Act.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Springfield Technical Community College Security Awareness Training.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
BUS VIDEO RECORDINGS COLLECTION – PROCESSING - REDACTION - SHARING WHAT IS RIGHT FOR YOUR DISTRICT?
FERPA 102 Helpful Guide for Administrators, Security Contacts and Support Staff Prepared by the Office of the Registrar Student Records: Institutional.
Information Privacy and Compliance Training For All Brigham Young University– Idaho Employees.
KDE Employee Training. What IS a Data Breach? Unauthorized release (loss or theft) of Sensitive or Confidential Data, such as PII, PHI, etc. On site or.
Critical Data Management Indiana University HR Summit April 24, 2014.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
What is personally identifiable information (PII)? KDE Employee Training Data Security Video Series 1 of 3 October 2014.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Security and Confidentiality Practices - Houston Dept. of Health and Human Services Jerald Harms, MPH, CART and Jeff Meyer, MD, MPH HIV/AIDS Surveillance.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
CSP Annual Security Training Miranda Gregory, CSP Analyst Carroll County Department of Citizen Services.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
Protecting Sensitive Information PA Turnpike Commission.
Practical Information Management
SECURING DATA FOR ER STAFF Windy L. Newton May 29, 2015.
Security and Privacy Strategic Global Partners, LLC.
Best Practices for Protecting Data. Section Overview Mobile Computing Devices Technical Procedures Data Access and Permissions Verbal Communication Paper.
Ames Laboratory Privacy and Personally Identifiable Information (PII) Training Welcome to the Ames Laboratory’s training on Personally Identifiable Information.
Training Module 11 – Version 1.1 For Internal Use Only Communication Policy ® Corporate Communications, Disclosure and Insider Trading Policy 
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
FERPA: What you Need to Know The Family Educational Rights and Privacy Act & SEI.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
SPH Information Security Update September 10, 2010.
© Copyright 2010 Hemenway & Barnes LLP H&B
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
When Can You Redact Information Without Requesting an Attorney General Decision? Karen Hattaway Assistant Attorney General Open Records Division Views.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Protection of Minors Program Coordinators Information Session November 2015 Carolyn Brownawell Melisa Giraldo Dietrich Warner.
SECURITY AND ELECTRONIC COMMUNICATIONS WHAT YOU NEED TO KNOW FOR YOUR AUDIT.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Overview to Student Data Privacy in Illinois
Protect Our Students Protect Ourselves
UW-Madison Guidelines for Managing the Records of Departing Employees*
HIPAA Privacy & Security
Protection of CONSUMER information
Privacy & Confidentiality
Data Security Policies
Privacy of Client Data.
HIPAA Basic Training for Privacy and Information Security
Overview to Student Data Privacy in Illinois
Red Flags Rule An Introduction County College of Morris
HIPAA Privacy & Security
Government Data Practices & Open Meeting Law Overview
H2.9b Maintain Information
General Data Protection Regulation Q & A Session
Government Data Practices & Open Meeting Law Overview
Move this to online module slides 11-56
Colorado “Protections For Consumer Data Privacy” Law
Protecting Student Data
Confidentiality Training 2014
The Health Insurance Portability and Accountability Act
Family Educational Rights and Privacy Act of 1974
Presentation transcript:

Data Access and Data Sharing KDE Employee Training Data Security Video Series 2 of 3 October 2014

 Most KDE employees have access to some confidential data. Can include:  Personnel data – even its just your own.  Student Information  School/district – personnel information  Financial Information  Confidential documents (ex: draft RFPs, legal documents, etc.)  Other --- may be subject to open records but not necessarily something that needs to be readily available. Who has access to confidential data?

 Access to PII must be approved by Manager, Director, Associate – depending on level of access. “NEED TO KNOW”  All employees sign Affidavit of Non-Disclosure as part of their Human Resource paperwork.  Agree to:  Not permit access to confidential data to unauthorized persons  Maintain confidentiality of data  Not reveal information for purposes other than statistical purposes authorized by KDE.  Report any instances of missing data, data inappropriately used, or taken off-site. Especially keep this last part in mind if you have virtual work agreement. Personally Identifiable Data (PII)

 Affidavit of Non-Disclosure also indicates employee understands that:  Unauthorized disclosure of confidential information is governed by FERPA and penalty for unlawful disclosure can result in fine and imprisonment.  Personal characteristics that could lead to membership in a group such as ethnicity or program area, are protected.  Data sets or output reports generated using confidential data are to be protected and not distributed to unauthorized parties.  Responsible for access using user id/password – DON’T SHARE. Personally Identifiable Data (PII) Affidavit of Non-Disclosure to become annual requirement for those with system access.

 Keep user ID and password secure.  Create strong password.  Don’t leave computer on and accessible when away.  Use VPN when wireless connection is unsecured.  Don’t print reports with PII unless absolutely necessary.  Shred documents that include PII when finished.  Periodically reviewed saved files to purge those no longer needed. Access of PII

 Do not include PII in s:  If PII received in remove it before responding; delete original .  Use SSID without other identifiable information.  If PII must be shared, data must be encrypted. Request a secure account. KDE uses through MOVE ITMOVE IT  Ensure documents created do not include identifiable data on screen shots. (examples: PowerPoint presentations, training documents)  Remove identifiable information or create dummy records that are clearly not real people.  Verify documents you receive don’t include PII before forwarding/sharing. Using PII

Storing PII  Personally identifiable data should not be saved on SharePoint, One-Drive, local hard drives, flash/thumb/jump drives or other external portable storage devices.  Access limited to those with “Need to Know”.  Analyze needs for storage of PII and request access to FILP1 for storing data.  Work through data governance member to communicate Office needs for data storage.  Clean out old files to ensure PII is not being stored inappropriately.

 Requests for PII must go through Enterprise Data. On-line data request form on KDE website – access through the Researchers link.  Enterprise data responsible for ensuring  Release allowable under FERPA exceptions  Memorandum of Understanding in place before any data is shared.  Data is shared securely.  Record of data release is maintained.  Contracts that necessitate release of data require same provisions. PII Requests

 Avoid sharing PII if at all possible;  Discourage districts from sharing PII.  When necessary, share only through secure (MoveIt) or Secure FTP.  Store data securely  Password protect files  Store on FILP1 – not on hard drive, external devices, One-Drive or SharePoint.  Redact or suppress aggregate level files.  Purge old files or documents that contain PII.  Contact Office Data Policy Member for guidance on best practices or Enterprise Data division. PII Best Practices