Sensitive Data Accessibility Financial Management College of Education Michigan State University.

Slides:



Advertisements
Similar presentations
Cash Collection and Deposit Training Financial Services.
Advertisements

Managing Sensitive Data at Michigan State University Presentation on behalf of Controllers Office Internal Audit Libraries, Computing & Technology.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Red Flag Rules: What they are? & What you need to do
Internal Controls What Are They And Why Should I Care? 1.
Springfield Technical Community College Security Awareness Training.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
Data Breach Notification Toolkit Mary Ann Blair Director of Information Security Carnegie Mellon University September 2005 CSG Sponsored by the EDUCAUSE.
Identity Theft Solutions. ©SHRM Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
C USTOMER CREDIT CARD AND DEBIT CARD SECURITY (PCI – DSS COMPLIANCE) What is PCI – DSS Compliance and Who needs to do this?
Information Security Awareness April 13, Motivation Recent federal and state regulations and guidance Recent federal and state regulations and guidance.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
1 GRAND VALLEY STATE UNIVERSITY FAMILY EDUCATIONAL RIGHTS & PRIVACY ACT (FERPA) TRAINING OFFICES OF THE REGISTRAR AND UNIVERSITY COUNSEL JANUARY 20, 2009.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Data Security Overview ORSP Staff AT Desktop Service Team November 18th, 2014.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1
Securing Information in the Higher Education Office.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Auditors: Why do they ask all those questions? LGC Resource April 2015 Penny Austin, Assistant Director – IS Local Government Audit.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
 More than ___% of teens have a savings account.  ___% of teens age have a checking account. ___% of those ages have one.  Likewise, ___%
HIPAA Privacy & Security Kay Carolin Barbara Ann Karmanos Cancer Center March 2009.
2015 ANNUAL TRAINING By: Denise Goff
Where’s the Money Going? 10 Things You Should Know about Internal Controls and Fraud Donna S. Brown, CPA Bob Powell, CPA November 12, 2010.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
ISO27001 Introduction to Information Security. Who has day-to-day responsibility? All of us! Why Information Security? Control risk, limit liability What.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Data Breach: How to Get Your Campus on the Front Page of the Chronicle?
When you request technical support Please remember to request it by ing or calling , Even if you .
e-Learning Module Credit/Debit Payment Card Acceptance and Security
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Staying ahead of the storm: know your role in information security before a crisis hits Jason Testart, IST Karen Jack, Secretariat.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Grant Management Seminar Session 3 1 Session 3 Oversight and Reporting 10/13/2012.
1 Banking and Reconciliation. 2 To Certify As A Cash Handler  Visit the training website  Review the Payment Card Industry (PCI)
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
Privacy Compliance in Schools Darrebin A/P’s Network 7 May 2009.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Information Management and the Departing Employee.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
Americans with Disabilities Act (ADA) Training for Faculty
Payment card industry data security standards
Protection of CONSUMER information
Information Security Seminar
Americans with Disabilities Act (ADA) Training for Faculty
Information on Types of Electronic Banking
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Red Flags Rule An Introduction County College of Morris
Managing Sensitive Data at Michigan State University
Cash Collection and Deposit Training
Move this to online module slides 11-56
UD PCI GUIDELINES A guide for compliance with PCI DSS and the University of Delaware Payment Card Program ALWAYS Process payments immediately using a solution.
Presentation transcript:

Sensitive Data Accessibility Financial Management College of Education Michigan State University

Sensitive data Back in 2005, the University started a campaign to make staff more aware of sensitive data concerns PCI DSS - Payment Card Industry Data Security Standard is that if credit card numbers are stolen from our servers and we are found to be in breach of the PCI DSS standard at the time of the breach, Visa and MasterCard may EACH fine the University up to $500,000 and then revoke out ability to use their credit cards. More information: MSU’s Managing Sensitive Data site at is worth a thorough read.

Levels of sensitivity for data Confidential Sensitive Public

Public data Not protected and generally made publically available Directories Library card catalogs Course catalogs Institutional policies

Sensitive data Protected by institutional policy, guidelines, or procedures – may be public/FOI-able (freedom of information) Salary data Detailed institutional accounting and budget data Personally restricted directory data Certain personal employee attributes

Confidential data Protected by law, contract, or University policy SSN payment/credit card health records student records

Where to look for sensitive data Digital Laptop computers, Desktop computers PDAs, thumb drives Network drives, web and file servers attachments, social networking sites Paper Sticky notes, notepads, paper files Receipts PAN forms and other official documents Travel documentation

Ask, “Do I absolutely need this data?” If not, get rid of it. If you do need it, minimize its exposure. As soon as you no longer need the data, delete it. Don’t leave sensitive data on computers or PDAs that are easily stolen. Make sure the computer the data is stored on is protected against viruses, worms, etc. Be careful distributing the data via or paper forms.

Identifying and reporting an incident For help determining if an exposure or intrusion occurred, contact the College Computer Support

What happens if an incident occurs? College CSG checks the computer to determine if there is sensitive data involved. Computer remains powered on but disconnected from the network. If there is sensitive data involved, College notifies DPPS at DPPS, the unit, and LCT will assess the incident. Systems involved may be taken for investigation. If necessary, MSU will disclose an exposure to those who might be affected

Incidents at MSU Despite best efforts, exposures have happened at MSU Student PIN #s exposed during data transfers between business units SSNs may have been exposed on a server at a business unit Student SSNs, names, addresses may have been exposed on a server at an academic unit Years of credit card transactions may have been exposed on a server at a business unit Confidential employee information may have been exposed on servers at a business unit

College Policy The college has been working on sensitive data management and security awareness has increased. Our data is more secure now that we have followed the policy for a few years. All college staff are required to attend sensitive data awareness seminar every three years.

And in practical terms, that means? No confidential data on college servers or computers There is no reason to store SSNs on a computer, so don’t. If you need to use SSNs at all (and we know there are reasons), work with us to make sure they are handled with a minimum of risk. For credit card/payment information, use web credit service at If you absolutely must have SSNs, credit card numbers, or any other sensitive data on paper, destroy those papers as soon as you don’t need the data anymore. If you need to keep the data, lock the papers up, then destroy them as soon as you can. Most importantly: be aware of how you can minimize exposure.

Financial Management Oversight Segregation of duties: More than one person needed to complete a record transaction. Implement mitigating controls if staffing resources do not permit desired segregation of duties. Adequate oversight: at least take samples. Pay attention to high risk areas: cash and inventories. Take periodic inventory. Monthly reconciliation of P-card statement is required.

Accessibility Web accessibility means that people with disabilities can read, navigate, and contribute on the Web through the use of assistive technology like screen readers. The web accessibility initiative facilitates MSU interacting with the broadest possible audience. The web accessibility policy will start being enforced May 15, 2009.

What needs to be accessible? Any content that is considered “core business” by the university must be accessible.

What is “core business”? Core business is defined very broadly. It is “activities that students, employees, or visitors must access in order to effectively participate in a program, service, or activity offered by the University.” In practical terms, this means EVERYTHING (web pages, PDF documents, Word documents, etc.) except personal web sites or documents. In theory, it also includes internal documents that students never see.

The University will help. LCTTP has free classes on how to make Word documents and PDFs accessible. In fact, one is offered on April 3. Details here:

If you do create web site or edit pages You need to follow the University’s guidelines, which can be found here: technical-guidelines.htmlhttp://webaccess.msu.edu/policies-and-guidelines/interim- technical-guidelines.html

What about my faculty members? The policy dictates that faculty are responsible for making their own course content accessible. This includes course information on Angel or any other web-based teaching methods. Faculty are aware of this and have resources to consult in approaching this task.