Information Security & Compliance Financial Services Workshop February 10, 2010.

Slides:



Advertisements
Similar presentations
University of Minnesota
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Financial Services Workshop Margaret Umphrey ECU Information Security Officer March 12, IT Security, East Carolina University.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Complying With Payment Card Industry Data Security Standards (PCI DSS)
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Springfield Technical Community College Security Awareness Training.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
Information Privacy and Compliance Training For All Brigham Young University– Idaho Employees.
C USTOMER CREDIT CARD AND DEBIT CARD SECURITY (PCI – DSS COMPLIANCE) What is PCI – DSS Compliance and Who needs to do this?
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Security Controls – What Works
1 Goal is protection of sensitive data New Rice policy calls for protection of sensitive personally identifying information Confidential information includes:
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Why Comply with PCI Security Standards?
Introduction to PCI DSS
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Payment Card Industry Data Security Standard (PCI DSS) By Roni Argetsinger
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Protecting Sensitive Information PA Turnpike Commission.
An Introduction to PCI Compliance. Data Breach Trends About PCI-SSC 12 Requirements of PCI-DSS Establishing Your Validation Level PCI Basics Benefits.
Securing Information in the Higher Education Office.
Information Security Technological Security Implementation and Privacy Protection.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
HIPAA PRIVACY AND SECURITY AWARENESS.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Introduction To Plastic Card Industry (PCI) Data Security Standards (DSS) April 28,2012 Cathy Pettis, SVP ICUL Service Corporation.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
e-Learning Module Credit/Debit Payment Card Acceptance and Security
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
1 Banking and Reconciliation. 2 To Certify As A Cash Handler  Visit the training website  Review the Payment Card Industry (PCI)
Langara College PCI Awareness Training
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Fall  Comply with PCI compliance policies set forth by industry  Create internal policies and procedures to protect cardholder data  Inform and.
1 10/2013. This training is provided for cashiers, phone-a-thon participants, and fiscal personnel involved in payment card activities that are never.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Introduction to PCI DSS
Payment Card Industry (PCI) Rules and Standards
Protecting PHI & PII 12/30/2017 6:45 AM
East Carolina University
Internet Payment.
Chapter 3: IRS and FTC Data Security Rules
Internal Controls.
Red Flags Rule An Introduction County College of Morris
Disability Services Agencies Briefing On HIPAA
County HIPAA Review All Rights Reserved 2002.
HIPAA Overview.
Move this to online module slides 11-56
Introduction to the PACS Security
Internal Controls.
Protecting Student Data
Internal Controls.
Presentation transcript:

Information Security & Compliance Financial Services Workshop February 10, 2010

Information Security and Electronic PHI What is Information Security? “ Information Security ” - ensures the Confidentiality, Integrity, and Availability of information through safeguards. “ Confidentiality ” – information will not be disclosed to unauthorized individuals or processes “ Integrity ” – data from one system is consistently and accurately transferred to other systems. “ Availability ” – the data or information is accessible and useable upon demand by an authorized person.

Good Security Begins With You! Human error is the single largest cause of security incidents. You are the first line of defense in Information Security. Incorporate good security practices into your everyday routine.

What is Compliance? Compliance is a state in which an organization is in accordance with established guidelines, specifications, or legislation Federal, state and regulatory compliance laws and requirements necessitate financial institutions employ levels of security to protect sensitive information from compromise, unauthorized access, interception or corruption. The challenge is maintaining acceptable data security while meeting the business needs of the organization.

Data Breaches From 2005 through 2007, there were 277 publicly reported breaches at colleges and universities in the United States. Of the 263 reported privacy data breaches in the United States in 2008, about one-third (76) occurred at colleges and universities. More electronic records were breached in 2008 than the previous four years combined, fueled by a targeting of the financial services industry and a strong involvement of organized crime.

Data Breaches (contd) A Rockland Community College student worker has been accused of stealing credit card numbers of former students to purchase high-end clothing costing over $2,200. The student worker is believed to have gained access to the credit card information of 12 former students' transcript applications.

Data Breaches (contd) Students at Binghamton University in New York are circulating a petition to remove the university's chief information security officer following the discovery of boxes full of documents listing personal information of students and parents in an unlocked storage room.Binghamton University

Compliance and Security In order to meet the compliance requirements, organizations must approach data security from a holistic perspective. Consider what controls are needed to protect your most sensitive data, then implement those controls. A review of most compliance laws will reveal the same set of data security controls are required.

Compliance Examples UNC FIT NC Identity Theft Protection Act FERPA GLBA HIPAA HITECH Act PCI Red Flag Rules SOX

Information Security and Electronic PHI How Do We Become & Remain Compliant? Develop joint effort between ITCS and departments Integrate security and compliance into everyday processes Understand compliance is an ongoing process Develop and implement a set of standards that will satisfy most compliance requirements Maintain accountability

Don’t Share Logins and Passwords ITCS Identify information, assets and appropriate level of protection Conduct an assessment of risks and analyze against the probability of occurrence Implement reasonable and appropriate safeguards

Don’t Share Logins and Passwords ITCS (contd) Train students, faculty, staff, and third parties Require third parties to implement reasonable and appropriate safeguards Regularly monitor and test the effectiveness of implemented safeguards Review and revise the information security program

Don’t Share Logins and Passwords Department Identify and classify your data; determine data ownership and data type (public, sensitive, etc.) Ensure systems used in performing financial transactions are protected by strict technical controls Ensure online banking transactions computers are used SOLELY for such transactions (no , no web browsing, no general-purpose business use)

Don’t Share Logins and Passwords Department (contd) Require all other computers that access sensitive data employ the locked-down workstation configuration Make certain that personnel have the necessary security awareness and training; Appoint a resource from your department to receive in-depth security training Have written policies defining the controlled environment in which financial transactions can be conducted

Viruses What is PCI Compliance? Protection of customer payment card data as it is collected, transmitted, processed and stored PCIDSS – Payment Card Industry Data Security Standards PCISSC – Payment Card Industry Security Standards Council (All major payment card companies are represented in the PCISSC)

Viruses Why Comply? PCI compliance is NOT a Financial Services or ITCS initiative PCIDSS created and mandated by payment card companies PCIDSS adopted by Office of the State Controller (OSC) ECU Merchants must comply in order to operate under the Master Service Agreement administered by OSC

Viruses PCI Compliance Requirements for ECU Campus Merchants New Merchants must request and receive approval to accept payment cards from the University Cash Manager prior to accepting any payment cards All merchants are required to achieve and maintain 100% compliance with the PCIDSS No gray areas: Either you are 100% compliant or you’re not compliant

Viruses Are We PCI Compliant? SAQ: Self Assessment Questionnaires administered annually by Financial Services help determine compliance ITCS: Review systems involving computers or the campus network (i.e. workstations, software, servers, websites); Any computing system or IT device used to access, process, transmit, or store payment card data must be installed and verified by ITCS after approval by ECU Financial Services

Viruses How Do We Maintain Compliance? SAQ: Annual Assessment - All merchant departments must perform and pass an annual PCI compliance audit (administered by Financial Services) Security Awareness for staff members (annual certification) Additions or changes to your system must receive approval from Financial Services and/or ITCS prior to the purchase or implementation

Viruses How Do We Maintain Compliance? (contd) All workstations and servers that are part of a payment card system must have appropriate protection against malware and unauthorized access DO NOT store payment card data electronically! (workstations, servers, laptops, backup devices, etc…)

Viruses PCI Compliance – Things To Do Secure payment card data at ALL TIMES! Treat it like cash$$$ Destroy payment card data by cross-cut shredder or secure shredding service after business need is met If you must retain payment card data, store in a locked file cabinet and limit access to authorized staff members only

Viruses PCI Compliance – Things To Do (contd) Document payment card procedures in writing (Business Manual) Train staff on PCI standards Contact PCI compliance resource with questions

Viruses PCI Compliance – What Not To Do DO NOT store payment card data electronically! (workstations, servers, laptops, backup devices, etc…) DO NOT sore the full contents of any track of the magnetic stripe DO NOT store the card validation code (aka CVV)

Viruses PCI Compliance – What Not To Do (contd) DO NOT transmit payment card data via and discourage any data you might receive via DO NOT leave payment card data unattended (desk inbox, Fax machine, “to be filed” stack) DO NOT verbally repeat payment card account data for others to hear

Viruses PCI Compliance – What Not To Do (contd) DO NOT throw it in the trash! DO NOT use campus mail to transport payment card data DO NOT retain the full payment card account number (truncate all but last four digits) DO NOT Worry! We will help you achieve and maintain compliance! BUT you have to contact us…….

Viruses PCI Compliance Contact Questions concerning payment card systems should be directed to: Brian Heath University PCI resource PCI Website

Relevant Policies For Additional Information ECU IT Security IT Helpdesk / PCI Information

Presenters Margaret Streeter Umphrey Information Security Officer Clay Hallock IT Security Analyst Brian Heath PCI Compliance Resource