TAMUCC EPA SECURITY Security Training for Users of Canopy for Creation and Approval of Payroll Documents.

Slides:



Advertisements
Similar presentations
Protect Our Students Protect Ourselves
Advertisements

Evolution of Data Use and Stewardship Recent University-wide Data Stewardship Enhancements Integrated System Data Stewardship Shirley C. Payne, CISSP,
Conflict of Interest, Conflict of Commitment, and Outside Activities UTSA HOP 1.33 Non-covered UTSA staff 1.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
Privacy and Information Security Training ( ) VUMC Privacy Website
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Legal Responsibilities for Board Members of Nonprofit Organizations Or…all you need to know to stay out of trouble. Presented: July 2007 Prepared by: Elsbeth.
Employee Self Service October 15, 2012.
1 The University of Texas at Tyler Protecting the Confidentiality of Social Security Numbers UTS165 Information Resources Use and Security Policy.
SIU School of Medicine Identity Protection Act and Associated SIU Policy.
Records Management Basics 1 Jasmine Sourignavong, Division of Records Management Tre Hargett, Secretary of State.
Principal Investigator Effort Training Created 07/2010 by Sponsored Projects Administration.
Purdue Payroll Packets must be turned in COMPLETED! –Includes ORIGINALS of Passport or Driver’s License/Purdue Student ID and Social Security Card/Birth.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Internal Control Concepts A Guide for Deans, Directors, and Department Chairs.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Franklin Pierce Electronic Timecard Training Introduction  Human Resources and Payroll have partnered to generate an on-line timesheet process.  Each.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
CSP Annual Security Training Miranda Gregory, CSP Analyst Carroll County Department of Citizen Services.
1 LOGICAL ACCESS FOR University Medical Group Saint Louis University Click the Speaker Icon for Audio.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Mandatory Annual ACE Training Fiscal Year 2011 – 2012.
STUDENT FEDERAL WORK-STUDY ORIENTATION.
HIPAA PRIVACY AND SECURITY AWARENESS.
An Educational Computer Based Training Program CBTCBT.
Mandatory Annual ACE Training Fiscal Year 2010 – 2011.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
FISCAL RESPONSIBILITY IN TITLE III AND OTHER SPONSORED PROGRAMS AND GRANTS ADMINISTRATION Presented by Sharon S. Crews, M.Ac., CPA Vice President for Administrative.
.  Career & Student Employment o Overview of Student Employment o Student Requirements o Central Jobs & Hiring Process o Student Evaluations & Assessments.
Florida Information Protection Act of 2014 (FIPA).
Cash Handling and Funds Collection Policies and Procedures.
HIPAA (health insurance portability and accountability act)
2012 STAAR ALT General Security Training Presented by: Campus Test Coordinator.
TAMIU Systems 101: What’s in my account? Navigate FAMIS-Canopy to get answers. by The University Comptroller’s Office for TAMIU Enrichment Day ( )
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
Automated Statement of Accounts Project and Operational Guideline March 2011.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
DEFINE Departmental User Access Form and Guidelines January 2011.
Scarlett Gibb NIH Office of Extramural Research Office of Electronic Research and Reports Management Interim Chief, eRA User Support, Training & Documentation.
P URCHASING C ARD T RAINING FOR R EVIEWERS AND C ARDHOLDERS Presented by Blair Blankinship UB’s Director of Procurement.
Procedures A workers’ compensation injury must be reported to the Third-Party Administrator (TPA) within 24 hours. The First Report of Injury Form is.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Western Asset Protection
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
HIPAA Privacy What Every Staff Member Needs to Know.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Identity and Access Management
HIPAA Privacy & Security
Florida Information Protection Act of 2014 (FIPA)
Dining with Diabetes IRB Training 2017.
Florida Information Protection Act of 2014 (FIPA)
Records Management Compliance Training
Red Flags Rule An Introduction County College of Morris
Disability Services Agencies Briefing On HIPAA
County HIPAA Review All Rights Reserved 2002.
HIPAA Privacy & Security
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Lesson 1: Introduction to HIPAA
Move this to online module slides 11-56
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

TAMUCC EPA SECURITY Security Training for Users of Canopy for Creation and Approval of Payroll Documents

EPA SECURITY Access to the EPA System will be granted by a FAMIS & EPA Security Officer after the employee has completed all of the following: 1) FAMIS & EPA Access Request Form and Statement of Responsibility are filled out, signed and sent to USC 218, UNIT ) The department confirms that the job requires access to EPA to complete the duties assigned to the employee. 3) The employee has completed the EPA Creator or EPA Approver training.

EPA DATA SECURITY All of the data in the EPA System is confidential in nature and should be protected with diligence. The data in the EPA Training System is also confidential in nature and should be protected with diligence. Misuse of access privileges to EPA is considered a breach of security and the FAMIS & EPA Security Officers will follow the Texas A&M System Policy and the TAMUCC Procedures for Security Breaches.

EPA DATA SECURITY Examples of Security Sensitive and Confidential Data include: Social Security Numbers (SSN) Salary or Pay Rate Amount Salary or Pay Rate Merit Increase Amount Termination Reason Unannounced Position Changes

EPA Security Access Continued access to EPA will be changed, modified, or removed at anytime due to: Changes in job duties of the employee Parameter changes in the system itself Absence of use by the employee As a result of security breaches by the employee

A&M Policy for Security Breaches Allegations Allegations of a security breach will result in suspension up to 30 days pending the investigation of the facts. First Offense The first offense will result in suspension up to 30 days. Also, the offender shall receive a written reprimand. Copies of the reprimand will be distributed to the VP of Finance and Administration, Dean or Director of the offender, Internal Audit, and Security Control Analyst. Other action may be taken in accordance to the federal and state law (Chapter 33 Section 1, Title 7 of the Texas Penal Code), depending on the severity of the breach.

A&M Policy for Security Breaches Second Offense Access will be denied for one year from the time the breach is discovered. Other action may be taken in accordance to the federal and state law (Chapter 33 Section 1, Title 7 of the Texas Penal Code), depending on the severity of the breach. Third Offense Access will be permanently denied. Other action may be taken in accordance to the federal and state law (Chapter 33 Section 1, Title 7 of the Texas Penal Code), depending on the severity of the breach.

Security Breaches A Security Breach occurs when an employee: 1) Attempts to alter their access 2) Attempts to gain access to systems they are not authorized 3) Uses another employee’s ID or Password with or without the other employee’s knowledge 4) Distributes confidential data to persons not authorized to view the data 5) Manipulates the system to create illegal transactions 6) Approves transactions they are not authorized to approve

Prevent Security Breaches Ways to Prevent a Security Breach include: 1) Memorizing your ID and Password, not writing them down anywhere at your desk 2) Lock office and turn off computer when you are away 3) Shred unwanted paper documents with confidential information on it (Names, SSN’s, Birth-dates, Addresses, Salary Amounts) 4) Getting documented authorization before beginning a transaction 5) Obtaining proper security access 6) Contacting EPA Security at #5874 if you have any questions

EPA Electronic Office The FAMIS & EPA Security Officers are responsible for creating and maintaining the EPA Electronic Offices. These are to be mirror images of the organization structure and chain of authority within each department. If there are ever any changes, please contact the FAMIS & EPA Security Officers to make the changes to the EPA Electronic Office as soon as possible.

EPA Documents Each employee will only be given access to the EPA documents of their own department or departments that they work directly for. This will allow the creators to work on documents for the PIN’s assigned to those department(s). Approvers will only be able to approve on documents in their authorized department(s).

Acknowledgements System and General Offices - Texas A&M FAMIS Services BPP Services TAMU-CC Accounting Office m Created by Shclley Knight January 2005