APAN Group Owner Training. APAN Groups Overview FOUO PII Other types Information Categories Aggregate data impacts OPSEC Group Owner Responsibilities.

Slides:



Advertisements
Similar presentations
IT Security Policy Framework
Advertisements

Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Today’s Schools face:  Numerous State and Federal Regulations  Reduced Technology Funding  More Stringent Guidelines for Technology Use.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Privacy, Security, Confidentiality, and Legal Issues
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Paul Hubbard Portfolio Manager, Border and Transportation Security Information Sharing: Barriers and Solutions Sept 9 Workshop Summary Presented to Armed.
SANTA ROSA DISTRICT SCHOOLS , Internet, and Social Media Acceptable Use and Risk Policy 1.
Security Controls – What Works
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Developing a Records & Information Retention & Disposition Program:
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Data Management Awareness January 23, University of Michigan Administrative Information Services Data Management Awareness Unit Liaisons January.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Informed Consent and HIPAA Tim Noe Coordinating Center.
IT Security Challenges In Higher Education Steve Schuster Cornell University.
HIPAA – Health Insurance Portability & Accountability Act and the Privacy Act MSgt Nechele M. Chambers Senior Enlisted Liaison TRICARE Area Office-Europe.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
Chapter 10: Authentication Guide to Computer Network Security.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
City Hall of Iasi Ethics in e-guidance, privacy and security devices Date: Author: Cristina Nucuta.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Electronic Use Policies.   Social Media  Internet.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Using NIMA Limited Distribution Data & Products Many of NIMA’s data and products are Unclassified Limited Distribution (LIMDIS). These materials are used.
HQ Expectations of DOE Site IRBs Reporting Unanticipated Problems and Review/Approval of Projects that Use Personally Identifiable Information Libby White.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
THE FAMILY EDUCATION RIGHTS & PRIVACY ACT (FERPA) Presented by: Robin B. Snyder, Esquire.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Using the Intranet for Knowledge Management ISM 6021 By: Diana DeFazio - Carro.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
1 National Audioconference Sponsored by the HIPAA Summit June 6, 2002 Chris Apgar, CISSP Data Security & HIPAA Compliance Officer Providence Health Plan.
Information Security Training for People who Supervise Computer Users.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Employees’ Compensation Operations and Management Portal (ECOMP)
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Center of Excellence PEACE OPERATIONS ROLE OF THE MILITARY IN UN OPERATIONS IN UN OPERATIONS Col (Ret) Peter Leentjes Center of Excellence in Disaster.
Overview All Partners Access Network Pacific Warfighting Center US Pacific Command Alex Conway.
Approved for Public Release. Distribution Unlimited. 1 Government Privacy Rick Newbold, JD, MBA, CIPP/G Futures Branch 28.
Center of Excellence PEACE OPERATIONS ROLE OF THE MILITARY IN UN OPERATIONS IN UN OPERATIONS Col (Retd) Mike Morrison.
Managing Web Components of the National Marine Mammal Health and Stranding Response Program (MMHSRP) System Presented by: Angela D. Collins-Payne Information.
Joint Concept Development and Experimentation (JCD&E)
Navigating the Care Environment Introducing the Arts in Healthcare Environments.
FOIA Processing and Privacy Awareness at NOAA Prepared by Mark H. Graff NOAA FOIA Officer OCIO/GPD (301)
TASFAA 2016 Legacy of Leadership. TASFAA 2016 Legacy of Leadership Family Educational Rights and Privacy Act (FERPA) An Overview Molly Thompson Associate.
The NIST Special Publications for Security Management By: Waylon Coulter.
For Official Use Only (FOUO) and Similar Designations NPS Security Office
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Data Access & New Banner Admin UI Professional Development Session May 11, am Presented by: Management Information Center.
HIPAA Privacy What Every Staff Member Needs to Know.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 3 This material was developed by Oregon Health & Science University,
Overall Classification of this Briefing is UNCLASSIFIED//FOUO
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Introduction to the Federal Defense Acquisition Regulation
Information Security Seminar
Matthew Christian Dave Maddox Tim Toennies
NASA Communication Service Office (CSO) Instant Meeting Voice Conferencing Service - Moderator Guideline Training (SBU, ESD/NAMS, NetPerform) October.
HQ Expectations of DOE Site IRBs
Introduction to the PACS Security
Presentation transcript:

APAN Group Owner Training

APAN Groups Overview FOUO PII Other types Information Categories Aggregate data impacts OPSEC Group Owner Responsibilities Business Rules Wrap up Conclusion

APAN Group Owner Training APAN Groups Overview What is APAN –  The All Partners Access Network (APAN) is an internet based network that facilitates a multinational communication & collaboration environment that allows selective sharing of knowledge and information among military, other government and non-government agencies in support of conferences, Humanitarian Assistance/Disaster Relief and Peace Keeping Operations. APAN Groups –  In order to logically separate data, Groups have been instituted for dedicated information sharing and access control. Each group will have a dedicated group owner in charge of the information posted to their respected portal.

APAN Group Owner Training FOUO PII Other types Information Categories Information Categories –  Data can fall under a variety of classifications, handling guidelines and protection mechanisms. Under the Unclassified data category, there are several well known handling categories such as For Official Use Only (FOUO), Personally Identifiable Information (PII), Health Insurance Portability and Accountability Act (HIPAA) & Sensitive But Unclassified (SBU).  Although all these categories are unclassified, each of these data types have their own unique criteria for ing, posting to web servers and dissemination. As a group owner, it is important to understand the proper DoD and USG guidelines and policy for handling this data.

APAN Group Owner Training FOUO Information Categories For Official Use Only (FOUO) –  FOUO is a document designation and not a classification. This is used by DoD and other federal agencies to identify information that is not appropriate for public release.  Posting of FOUO to web sites is restricted to web servers that have access controls restricted to user based PKI certificates. APAN servers are not certified for this.  ing of FOUO documents outside of DoD networks require encrypted communications, such as digitally signed and encrypted.  FOUO data must be encrypted at all times to protect the information and restrict its access.

APAN Group Owner Training PII Information Categories Personally Identifiable Information (PII) –  Information that can be used to distinguish or trace someone’s identity. Information such as SSN, age, home phone numbers, passport numbers, birthday or spouses name.  Mandates to protect come from Federal law (as defined in Privacy Act of 1974) and DoD guidance (OMB Circular A-130).  PII data must be encrypted at all times (when placed on a file or web server) and in transit (when ing).  PII data lost or stolen is considered a security breach. It is everyone’s responsibility to properly store, protect and safeguard PII data.

APAN Group Owner Training Aggregate data OPSEC Operational Security (OPSEC) -  While some unclassified data in and of itself does not pose an issue, the aggregate of several pieces of data can cause an OPSEC issue.  OPSEC denies the adversary the information needed to correctly assess friendly capabilities and intentions.  OPSEC is concerned with identifying, controlling, and protecting unclassified evidence that is associated with General military operations and activities. OPSEC and security programs must be closely coordinated to ensure appropriate aspects of military operations are protected.  OPSEC can be viewed like a puzzle: one piece of data on a document, in combination with another piece of data from another document can be combined to create an OPSEC picture by revealing the whole puzzle.

APAN Group Owner Training Aggregate data OPSEC (cont) Operational Security (OPSEC) – Examples of OPSEC critical information Politico-Military Crisis Management Military Intervention Mobilization Peacetime Weapons and Other Military Movements Command Post, Computer-Aided, and Field Training Exercises Participating units OPLANs, CONPLANs, or other contingencies that are being exercised Command relationships Communication systems connections and weaknesses Noncombatant Evacuation Operations (Permissive/Nonpermissive) Targets Forces Logistic constraints Safe havens Battlespace Awareness Counterdrug Operations Counterterrorism Open Hostilities Diplomatic Negotiations

APAN Group Owner Training Group Owner Responsibilities Business Rules APAN Groups business rules –  Each group owner is responsible for the authorization for access to their respective site and the data posted to the site.  Validate need-to-know prior to granting access  Limit the number of members who can post information  Ensure postings are appropriate  Review activity of users periodically  The APAN networks are certified and accredited up to Unclassified. APAN is not authorized to host, disseminate or handle FOUO, PII, SBU, HIPAA or any other types of special handling unclassified data.  Review content weekly  Limit the amount of personal information available via portal  Remove content that is FOUO/PII/inappropriate

APAN Group Owner Training Parting thoughts Conclusion APAN is a UNCLASSIFIED system, all data contained on the group sites should be publically releasable without violating Federal laws or DoD policies. It is everyone’s responsibility to ensure all the data residing on the APAN sites are cleared for public release. Group owners must be vigilant in identifying potential OPSEC violations. Groups that are found to repeatedly violate standards will be suspended, and group owner rights revoked pending refresher training and site “policing.”