What is the big idea behind the 12/3 Identity Finder scan? The system-wide scan on 12/3 is intended to permanently remove all PII and anything looking.

Slides:



Advertisements
Similar presentations
Add a Conference Module Screen Shots When you have a conference it is very easy, call the web office and ask how the initial setup of a conference works.
Advertisements

ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Introduction to Physics IT Support. To learn about IT Support available with the Department of Physics, and across the University. To find out a little.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely P J Human Resources Pte Ltd presents:
A new way of printing at S.T.C.C.
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
Anytime/Anywhere Access Cloud Computing Cloud Applications Cloud Desktop Cloud Storage John Waugh Client Relationship Manager ITS.
File Management & Computer Use You are required to take notes. I will be taking a grade. There will be a test over this material.
How to download and install Sharpdesk
PII – Identifying and Managing Risk Presented by: UNL Office of Internal Audit and ITS Security March 2014.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
FDIC Money Smart for Young Adults
Trojan Horse Program Presented by : Lori Agrawal.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Migration Not such a big deal. What am I getting Increased mailbox size (from 2 GB to 50 GB for university Exchange users) Unified and calendaring.
Information Security Office 1 Copyright Statement Copyright Mary Ann Blair This work is the intellectual property of the author.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
STORAGE SOLUTIONS Research Data Management. Keeping your data just on your working machine, be it lap top or desktop, is the perfect way to loose your.
Penn State University College Of Education Understanding College of Education Resources.
Security SIG August 19, 2010 Justin C. Klein Keane
September 2007 General Security Basics Your Responsibilities for Safe Computing.
CAB Symposium Message Management Archiving Presented by: Customer Staff Development Services.
Protecting Sensitive Information PA Turnpike Commission.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
CPS Acceptable Use Policy Day 2 – Technology Session.
Tutorial 11 Installing, Updating, and Configuring Software
Computer Information Use your own login and password if possible. To get a password, you must turn in the AUP sheet handed out at registration or sent.
How to Backup FNC Files to Corporate Network Using Windows XP Created By: Ricardo G. Mesa, Systems Administrator Date: January 17, 2006.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely presents:
Data Risk and Security Andrew Roderick Campus Technology Committee – January 21, 2015.
Information Services Overview An introduction to DePaul’s technology especially for new employees.
Troubleshooting Windows Vista Security Chapter 4.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Indiana University’s Research File System. What is the IU Research File System? /user1/user2 /collaboration User 1, on campus User 2, somewhere else BACKUP.
Client – Server Application Can you create a client server application: The server will be running as a service: does not have a GUI The server will run.
Microsoft Office 2008 for Mac – Illustrated Unit C: Understanding File Management.
Downloading and Installing Autodesk Revit 2016
Recommended Blackboard Course Management Fall 2013.
Cyber Security Awareness Month Using Your Laptop Safely On the Road Off-Campus Safe Computing Part 2.
Diagnostic Pathfinder for Instructors. Diagnostic Pathfinder Local File vs. Database Normal operations Expert operations Admin operations.
Cloning Windows NT Systems Mainly based on experiences at RAL and Oxford.
Training Session II Storage Services Mapped Drives Web Folders/SMB Htcomnet FTP Quota.
Teleworking Effectively Or, how to work from home without SNA or a token. Don’t be this guy:
Cyber Security Awareness Month Protecting Your Laptop’s Data Off-Campus Safe Computing Part 1.
How Not to Lose the Only Copy of Your Research Storage and Backup Tools at Brandeis Melanie Radik and Raphael Fennimore Library & Technology Services Workshops.
Microsoft Office 2008 for Mac – Illustrated Unit B: Getting Started with Mac OS X Leopard.
Welcome School of Business Information Technology Services Chris Buckridge, Chris Zissis, Chris Hewitt 10 Fulltime Staff Members 10 Student Techs.
Palm Creek RV and Golf Resort December 07, 2011 Garth Vanstone.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Windows and Mac OSX.  Formatting a disk prepares it to accept data  NTFS on Windows  HFS+ on the Mac  There are lots of different formatting options.
Procedures Manual 1.Removing sensitive informationRemoving sensitive information.
IDENTITY FINDER TRAINING. What is Identity Finder?  Identity Finder is a program that is installed on your desktop, laptop, or server to locate personally.
THE WINDOWS OPERATING SYSTEM Computer Basics 1.2.
Opening up a Checking Account Eliseo Lugo III. 2 To choose the one that’s right for you when the time comes To take the right steps to open a bank account.
Identity Theft: Protect Yourself Ronald J. Leach.
Easy way to check if you have large Folders or Files Another way to check if you have large Folders or Files Deleting Files and Folders Flexible IT supporting.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
Penn State University College of Education Understanding College of Education Resources.
and Network Management Presented by: Information Technology.
Dial-In Number: 1 (631) Webinar ID: FHC Tech Talk Automation and Efficiency Series Talk #1 Carbonite automated backup.
Office 365 Help Desk Troubleshooting Guide
Identity Finder Client
5 Reasons Why Office 365 Rocks!
Handling Personal Data
Malcolm Days Mark Miners James Farnhill
Computer Concept What is a computer?
Sloan Technology Services PC Recommendations
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Preparing your laptop for life after Clemson
Presentation transcript:

What is the big idea behind the 12/3 Identity Finder scan? The system-wide scan on 12/3 is intended to permanently remove all PII and anything looking like PII from all CCSU local hard drives. If data is removed during this scan, it cannot be recovered. PII is personally identifiable information. Other locations, like accounts and network shares (M and S drives) are not part of the 12/3 scan. Longer term, we will need to deal with PII in these locations as well.

What is considered to be PII? For the purposes of the 12/3 scan, PII includes: 1.Social Security Numbers. 2.Credit Card Numbers. 3.Bank Account Numbers. 4.Driver’s License Numbers. The CCSU default set-up for Identity Finder looks for any pattern of numbers that looks like one of these.

Why should I scan my computer ahead of the 12/3 scan? You get to determine what happens to your data. The baseline scan(s) you run will do two nice things: 1.Identify PII on your machine, so that you can properly secure it. 2.Identify information on your machine that looks like PII but isn’t (false positives). You can remove it or tell the next scan to ignore it. False positives can be invoice numbers, SKU codes, or other patterns of numbers.

Which computers are affected? All CCSU-owned Windows and Mac machines in faculty and staff offices, both desktops and laptops. All shared computers in offices. – Will need to be scanned by all individual users. Teaching station computers in smart classrooms and computers in labs are not affected. – These do not allow users to save anything permanently to the hard drive.

Aren’t I allowed to have PII for research and records retention reasons? Yes, and you may well be required to retain these records for a period of time. But you do need to secure this information. – Your computer’s hard drive is not a good place. A secure network share is the best place to store it. – Information Technology has a form for you to request a secure share.

What must I do before 12/3? Scan every CCSU-owned computer you use, or that you suspect may have PII on it. Shared computers will need to be scanned by each individual user. Do the default scan that covers the computer hard drive and your CCSU , as a baseline. Identity Finder guides for both Windows and Mac computers are available on the IT Department Identity Finder webpage.

What if I find PII or false positives on my computer? If you get a hit on your CCSU account: You must either choose the Shred option (to permanently remove it) or delete the yourself. The program will not offer you any other options. Alternatively, you can place the s in a separate folder, and archive the folder to your hard drive or network share. – The program will then allow you to choose from the other options.

What if I find PII or false positives on my computer? If you get a hit on your hard drive: Shred: Permanently remove. Scrub: Redact the PII, but retain the other data. Ignore: Mark the item so that future scans will ignore it. This is fine for false positives, but not for PII. Manually move information to a secure share. Quarantine option is not available to us at this point.

I’m confused and I don’t know what to do next. Help! Information Technology will be glad to help. Call the Help Desk. Consult the IT Identity Finder webpage.