Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.

Slides:



Advertisements
Similar presentations
Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
Advertisements

University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Complying With Payment Card Industry Data Security Standards (PCI DSS)
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Massachusetts privacy law and your business  Jonathan Gossels, President, SystemExperts Corporation  Moderator: Illena Armstrong  Actual Topic: Intersecting.
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Data Ownership Responsibilities & Procedures
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Financial Data Protection and Consumer Notification of Data Security Breach Act of 2006 Sara Juster, JD Vice President/Corporate Compliance Officer Nebraska.
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Jeff Williams Information Security Officer CSU, Sacramento
Data Classification & Privacy Inventory Workshop
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
Information Security Policies and Standards
1 Goal is protection of sensitive data New Rice policy calls for protection of sensitive personally identifying information Confidential information includes:
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
GPUG ® Summit 2011 November 8-11 Caesars Palace – Las Vegas, NV Payment Processing Online and Within Dynamics GP PCI Compliance and Secure Payment Processing.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Why Comply with PCI Security Standards?
Payment Card Industry (PCI) Data Security Standard
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Payment Card Industry Data Security Standard (PCI DSS) By Roni Argetsinger
Protecting Sensitive Information PA Turnpike Commission.
The influence of PCI upon retail payment design and architectures Ian White QSA Head of UK&I and ME PCI Team September 4, 2013 Weekend Conference 7 & 8.
An Introduction to PCI Compliance. Data Breach Trends About PCI-SSC 12 Requirements of PCI-DSS Establishing Your Validation Level PCI Basics Benefits.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
PCI requirements in business language What can happen with the cardholder data?
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
FAIR CREDIT REPORTING ACT.  Serves the following principal purposes:  To regulate the consumer-reporting industry.  To prohibit unfair actions from.
HIPAA PRIVACY AND SECURITY AWARENESS.
Introduction to Payment Card Industry Data Security Standard
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Introduction To Plastic Card Industry (PCI) Data Security Standards (DSS) April 28,2012 Cathy Pettis, SVP ICUL Service Corporation.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
STANFORD UNIVERSITY RESEARCH COMPUTING Are we outliers? Institutional minimum security requirements RUTH MARINSHAW OCTOBER 14, 2015.
1 Payment Card Industry (PCI) Security Standard Developed by the PCI Security Council formed by major card issuers: Visa, MasterCard, American Express,
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
Standards in Use. EMV June 16Caribbean Electronic Payments LLC2.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Payment Card Industry (PCI) Rules and Standards
Performing Risk Analysis and Testing: Outsource or In-house
PCI-DSS Security Awareness
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Internet Payment.
Session 11 Other Assurance Services
Chapter 3: IRS and FTC Data Security Rules
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Red Flags Rule An Introduction County College of Morris
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Identity Theft Prevention Program Training
Colorado “Protections For Consumer Data Privacy” Law
Jadu XForms Professional
Presentation transcript:

Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities

Red Flag Rules What are the “Red Flag Rules”? (Identity theft prevention program required by federal law) What does it mean to us? (Applies to us where our operations allow persons to use a credit or deposit account where payments are made periodically.) What is a “Red Flag”? ( A red flag is a pattern or activity that might indicate identity theft.)

CSU Response CSU-wide program development guidelines ready to go before Board of Trustees Guidelines include sufficient information to develop a qualified program Campuses required to develop a program and report on compliance

Campus Red Flag Program Goals  Identify Covered Accounts  Identify Relevant Red Flags  Review/develop mechanisms to Detect Red Flags  Review/develop mechanisms to Respond to Identity Theft  Integrate Red Flags Rule into Current Compliance Program Activities  Ensure Contract Compliance  Provide Employee Training  Provide Oversight and Review of the Program

PCI Compliance Payment Card Industry Data Security Standard (PCI DSS) imposed by industry on all organizations that accept payment cards PCI DSS is multi-faceted security standard that includes requirements for security management, policies, procedures, network architecture, software design and other critical data protection measures.

CSU Response Each campus must complete a PCI DSS assessment Implement or maintain a compliant security program CSU PCI Compliance Guidelines: Implement working committee Determine merchant and assessment activities Develop payment card authorization policy Develop campus security program Annual assessment activity

PCI Committee Objectives The committee must Obtain the support of senior management! Include representation from Information Technology, Information Security, Internal Audit, Business and Finance, and auxiliary organizations. Establish a comprehensive inventory of information related to its use of payment cards. Determine which of the standards apply (depends on volume of payment card activity across campus) Develop campus policy to review and approve new payment card activities Ensure that the campus information security policy and incident response plan meets the PCS DSS standard Conduct assessments and reviews and/or managed independent third party verification activities

PCI DSS Standard Overview Build and Maintain a Secure Network Install and maintain a firewall configuration to protect cardholder data Protect Cardholder Data Protect stored cardholder data Encrypt transmission of cardholder data and sensitive information across open public networks Maintain a Vulnerability Management Program Use and regularly update anti-virus software Develop and maintain secure systems and applications Implement Strong Access Control Measures Restrict access to data by business need-to-know Assign a unique ID to each person with computer access Restrict physical access to cardholder data Regularly Monitor and Test Networks Track and monitor access to network resources and cardholder data Regularly test security systems and processes Maintain an Information Security Policy Maintain a policy that addresses information security

Data Classification Activity In order to comply with the CSU-wide Information Security Policy and Standards, the campus is required to maintain an inventory of information assets which contain critical or protected data. Contact each campus organization and gather information about “protected” data and the methods by which it is stored. Use responses to create an inventory database. Survey released this week.

Protected Level 1 – Confidential Data Confidential Information is information maintained by the University that is exempt from disclosure under the provisions of the California Public Records Act or other applicable state or federal laws. Confidential information is information whose unauthorized use, access, disclosure, acquisition, modification, loss, or deletion could result is severe damage to the CSU, its students, employees, or customers. Financial loss, damage to the CSU’s reputation, and legal action could occur. Level 1 information is intended solely for use within the CSU and limited to those with a “business need-to know.” Statutes, regulations, other legal obligations or mandates protect much of this information. Disclosure of Level 1 information to persons outside of the University is governed by specific standards and controls designed to protect the information. Passwords or credentials that grant access to level 1 and level 2 data PINs (Personal Identification Numbers) Birth date combined with last four digits of SSN and name Credit card numbers with cardholder name Tax ID with name Driver’s license number, state identification card, and other forms of national or international identification (such as passports, visas, etc.) in combination with name Social Security number and name Health insurance information Medical records related to an individual Psychological Counseling records related to an individual Bank account or debt card information in combination with any required security code, access code, or password that would permit access to an individual's financial account Biometric information Electronic or digitized signatures Private key (digital certificate) Attorney/client communications Legal investigations conducted by the University Third party proprietary information per contractual agreement Sealed bids

Protected Level 2 – Internal Use Data (Partial List) Internal use information is information which must be protected due to proprietary, ethical, or privacy considerations. Although not specifically protected by statute, regulations, or other legal obligations or mandates, unauthorized use, access, disclosure, acquisition, modification, loss, or deletion of information at this level could cause financial loss, damage to the CSU’s reputation, violate an individual’s privacy rights, or make legal action necessary Non-directory educational information may not be released except under certain prescribed conditions. Identity Validation Keys (name with) Birth date (full: mm-dd-yy) Birth date (partial: mm-dd only) Student Information-Educational Records (Excludes directory information) including: Grades Courses taken Schedule … Employee Information Employee net salary Employment history Home address Personal telephone numbers Personal … Other Library circulation information. Trade secrets or intellectual property such as research activities …