1 General Awareness Training Security Awareness Module 1 Overview and Requirements.

Slides:



Advertisements
Similar presentations
IT Security Policy Framework
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Federal Law and Student Privacy and Federal Law and Health Care Privacy New Business Manager Training NMASBO.
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
DOCUMENTATION Missouri Medicaid Audit and Compliance Provider Certification Review Materials.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Privacy Laws & Higher Education. Agenda 1.Five Privacy Laws a.FERPA b.HIPAA c.GLB d.FACTA Disposal Rule e.CAN-SPAM 2.Overview of the Laws a.What does.
Today’s Schools face:  Numerous State and Federal Regulations  Reduced Technology Funding  More Stringent Guidelines for Technology Use.
HIPAA Security Regulations Jean C. Hemphill Ballard Spahr Andrews & Ingersoll, LLP November 30, 2004.
Regulatory Issues in Campus Computing Privacy and Security in a Digital World Presented by David Gleason, Esq. University Counsel University of Maryland,
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Springfield Technical Community College Security Awareness Training.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Information & Communication Technologies NMSU All About Discovery! Risk-Based Information Security Program at NMSU presented by Norma Grijalva.
Security Controls – What Works
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Data Security At Cornell Steve Schuster. Questions I’d like to Answer ► Why do we care about data security? ► What are our biggest challenges at Cornell?
New Faculty Orientation to Privacy and Security at UF Susan Blair, Chief Privacy Officer Kathy Bergsma, Information Security.
IT Security Challenges In Higher Education Steve Schuster Cornell University.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Electronic Records Management: What Management Needs to Know May 2009.
2005 MASFAA CONFERENCE CHARLESTON, WEST VIRGINIA Ginny D’Angelo Vice President of Student Loans Commerce Bank Diane Lambart Fleming Associate Director.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
An Educational Computer Based Training Program CBTCBT.
STANDARD 5.3 Objective 3 Students will explain and understand the need for confidentiality.
Confidentiality for Transportation Personnel.  Family Educational Rights and Privacy Act (FERPA)  Kentucky Family Educational Rights and Privacy Act.
Student Confidentiality: The FERPA/HIPAA Facts AISD Policy Student Records AISD Procedure AP. 11.
Confidentiality for Transportation Personnel  Family Educational Rights and Privacy Act (FERPA)  Kentucky Family Educational Rights and Privacy Act.
Introduction to Computer Security PA Turnpike Commission.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Eliza de Guzman HTM 520 Health Information Exchange.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Confidentiality for Foodservice.  Family Educational Rights and Privacy Act (FERPA)  Kentucky Family Educational Rights and Privacy Act  Protection.
Addressing Unauthorized Release of Personal Information at UC Davis August 12, 2003.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
1 General Awareness Training Security Awareness Module 4 Helpful Websites— More Information GAT Roadmap.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES 1 The Technical Services Stuff in IT Services A brief tour of the technical and service offering plethora.
When Can You Redact Information Without Requesting an Attorney General Decision? Karen Hattaway Assistant Attorney General Open Records Division Views.
FERPA AND HIPAA COMPLIANCE AS COMMUNITY PARTNERS Written and presented by Nicole M. Thompson School Board Attorney, School Board of the City of Richmond.
Prepared by The Office of the Registrar Youngstown State University February, 2009.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Working with HIT Systems Unit 7a Protecting Privacy, Security, and Confidentiality in HIT Systems This material was developed by Johns Hopkins University,
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
Confidentiality Annual Training. Board Policy JG Please follow the link below to access the board policy dealing with student discipline and confidentiality.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Confidentiality and HIPAA For Mentors. Basic confidentiality requirement for Mentors It is expected that all Mentors having access to client and personnel.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
TASFAA 2016 Legacy of Leadership. TASFAA 2016 Legacy of Leadership Family Educational Rights and Privacy Act (FERPA) An Overview Molly Thompson Associate.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Data Access & New Banner Admin UI Professional Development Session May 11, am Presented by: Management Information Center.
Junli M. Awit, RN.  Enacted by President Bill Clinton in 1996  Title I of HIPAA protects health insurance coverage for workers and their families when.
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
Student Confidentiality: The FERPA/HIPAA Facts
Developed by: Human Resources February 2011
Disability Services Agencies Briefing On HIPAA
County HIPAA Review All Rights Reserved 2002.
CompTIA Security+ Study Guide (SY0-401)
HOSPITALITY HUMAN RESOURCES MANAGEMENT AND SUPERVISION.
Lesson 1: Introduction to HIPAA
HIPAA & PHI TRAINING & AWARENESS
Evaluation and assessment
Student Confidentiality: The FERPA/HIPAA Facts
Presentation transcript:

1 General Awareness Training Security Awareness Module 1 Overview and Requirements

2 Overview Why do we need Security Awareness? Because Computer security is everyone’s responsibility. Employees and students must become aware of their individual and shared information security responsibilities and liabilities. Employees and students must become concerned about the consequences of not protecting their personal computers and information on the university network. Employees and students must take action to secure their identity on the university network and report security incidents to Security and Disaster Recovery (SDR).

3 What are the individual and institutional security requirements? Federal and State Requirements Additional Information Additional Information University of Houston Requirements Additional Information Additional Information IT Requirements Additional Information Additional Information Research Requirements Additional Information Additional Information Residential Life and Housing Requirements Additional Information Additional Information College Requirements Additional Information Additional Information Contractual Requirements Additional Information Additional Information Auxiliary's Requirements Additional Information Additional Information

4 Federal Requirements Federal regulations require all users of information technology systems to conform with certain basic requirements and receive annual IT security awareness training Family Educational Rights and Privacy Act (FERPA) Schools must have written permission from parents or eligible student in order to release any information from a student’s education record

5 cont. Federal Requirements Health Insurance Portability and Accountability Act (HIPAA) Protects health insurance coverage for workers and their families when they change or lose their job Gramm-Leach-Bliley Financial Services Modernization Act (GLB) Requires financial institutions to take steps to ensure the security and confidentiality of customer records such as names, addresses, phone numbers, bank and credit card account numbers, income and credit histories and Social Security numbers. Return Return

6 State Requirements Texas Administrative Code (TAC) 2.02 Applicable terms and technology for Information Security and Disaster Recovery Security standards for Institutions of Higher Education Texas Public Information Act Texas Penal Code Section 33.03, Accessing a computer network or system without proper authorization Return Return

7 University of Houston Requirements Security Orientation and Training Connecting Devices to University Communication Network U of H Computer Policies and Guidelines Appropriate Use of Computing Resources z Manual of Administrative Policies and Procedures System Administrative Memoranda Information Security Manual Return Return

8 IT Requirements General Computing Policies Computer Security Violation Reporting System Administrator Responsibilities Individual Accountability Data and Software Access Control Information Security Manual Return

9 Requirements that must be met by Each User! Research Requirements Additional Information Additional Information Residential Life and Housing Requirements Additional Information Additional Information College Requirements Additional Information Additional Information Contractual Requirements Additional Information Additional Information Auxiliary Requirements Additional Information Additional Information