STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.

Slides:



Advertisements
Similar presentations
Financial Services Workshop Margaret Umphrey ECU Information Security Officer March 12, IT Security, East Carolina University.
Advertisements

Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Welcome to the SPH Information Security Learning Module.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Information Security Awareness:
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
IT Security Essentials Ian Lazerwitz, Information Security Officer.
10 Essential Security Measures PA Turnpike Commission.
THE WHY AND HOW OF DATA SECURITY YOUR ROLE IN DATA STEWARDSHIP DEPARTMENT OF MEDICINE IT SERVICES.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
SECURITY: Personal Health Information Protection Act, 2004 this 5 min. course covers: changing landscape of electronic health records security threats.
New Data Regulation Law 201 CMR TJX Video.
Aaron Cauchi Nurse Informatics
Practical Information Management
Program Objective Security Basics
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
ESCCO Data Security Training David Dixon September 2014.
1.1 System Performance Security Module 1 Version 5.
SECURITY Research Data Management. Research Data Management Security Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Privacy and Information Management ICT Guidelines.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
® HHM Clean Desk Policy. 2 ® Clean Desk Policy : What Will You Learn Importance of Privacy and Security The kinds of information we protect Privacy Requirements.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Physical security By Ola Abd el-latif Abbass Hassan.
FLHS TECHNOLOGY SURVIVAL GUIDE A QUICK GUIDE FOR STUDENTS.
Government Agency’s Name April Identity Theft is when someone steals your personal information and uses it as their own, usually for some financial.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Computer Security Sample security policy Dr Alexei Vernitski.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
An Online learning journal system. Staff record children's progress and activities using tablet devices and PCs. Parents can view their child’s journal.
2015Computer Services – Information Security| Information Security Training Budget Officers.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
ISMS Information Security Management System
Personal Data Protection and Security Measures
Mysale Information Classification 101
Protection of CONSUMER information
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Key behavior # 1 Be Secure Awareness Quiz
Staying Austin College
Information Security Awareness 101
Data Protection Scenarios
Information Security and Travel-related Security
Welcome to the SPH Information Security Learning Module
Mysale Information Classification 101
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Handling Information Securely
Presentation transcript:

STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect

No damage Classify information Severe damage Public Intended for public use, or drawn from a public source Internal For employees, agents and contractors only Confidential Restricted access internal information Strictly Confidential Highly restricted internal information ‘Critical’ information

Storing information Use a Royal Mail SharePoint site, but pay close attention when setting access permissions Store information on Royal Mail servers and devices only Information stored on removable media must be encrypted

Protect your work equipment Lock your computer by pressing  and L Lock away critical printed documents Whenever you leave your desk unattended Lock your laptop away if leaving it in the office overnight Use a privacy screen when working on critical information Working remotely? Always use VPN to connect to the Royal Mail network Travel with equipment and printed documents in separate bags 

Sharing information Never use consumer systems such as Hotmail, Gmail and Dropbox as they put your work at risk Internal s are encrypted automatically Only share Strictly Confidential information on a “need to know” basis Critical information sent to external parties must be encrypted

Printing, scanning & photocopying information Don't forget to take your original copies when photocopying or scanning When printing or scanning critical information: Check you have everything before you leave: Use locked print and locked scanning modes

Disposing of information All Confidential and Strictly confidential information must be disposed of in a secure manner: Use general recycling for Public and Internal information Confidential waste binShredder

Handle information correctly from start to finish of information in the correct manner (e.g. a confidential waste bin) every piece of information you create on Royal Mail servers or devices Your Royal Mail Laptop and work equipment using locked print and locked scanning modes FINISH DisposePrint & ScanShareStore START ClassifyProtect with authorised colleagues only

Top tips for protecting information Every time you leave your desk unattended: Lock your computer by pressing  and L Lock away critical printed documents Use a privacy screen for critical information Use VPN to connect to the Royal Mail network You must also:

Top tips for protecting equipment Your laptop: Your mobile device: Seek approval before downloading software Lock away laptops left in the office overnight Enable auto-locking and use a strong PIN or password Only download trusted apps Working remotely? Never leave equipment or printed documents unattended