170 likes | 277 Views
K eep I t C onfidential. This is a draft. Prepared by: Security Architecture Collaboration Team. Data Confidentiality. What data is considered confidential? Data Classification Public Campus maps Sensitive Contractual obligation to protect Right to Know Restricted Required by law
E N D
KeepItConfidential This is a draft Prepared by: Security Architecture Collaboration Team
Data Confidentiality • What data is considered confidential? • Data Classification • Public • Campus maps • Sensitive • Contractual obligation to protect • Right to Know • Restricted • Required by law • HIPAA • FERPA
Data Confidentiality • Remember the 3R’s • Roles • Rules • Responsibility
Roles • System Administrator/Technical • Management • Faculty • Student • Staff
Rules • PASSHE Policy • Employment Contract • Confidentiality Policy • Risk Assessment
Responsibility • Everyone
Responsibility • Individual accountability • System Administrators and Managers • Responsible for safeguarding confidential data • Responsible for compliance • Responsible for persons under their supervision • Faculty • Responsible for confidential data to which they have access • Bio/Demo data (including DOB and SSN) • Student Grades and historical data • Students • Responsible for managing their own confidential data • Log out of session • Do not share passwords • Staff • Responsible for confidential data to which they have access • Bio/Demo data (including DOB and SSN) • Student Grades and historical data • Salary Information
User Security Awareness • Topics • Password use and management • Virus protection • Phishing/Spam • Laptop/Handheld Device • Access privileges • Data backup and storage • Incident response
Security Breaches • Follow designated policies and procedures
Misuse Penalties • Civil and Criminal • Conflict of Interest • Disciplinary Action
Checklist • Policies and procedures are in place • Data submissions are fully protected • Data encryption • Data transfer agreement • Penalties for misuse are in writing and are enforced • Access to data is restricted based on University role • Electronic • Data storage areas • Employees sign and understand confidentiality agreement
Checklist • Timely threat notifications • Security Breaches • Affects institutions’ finances, productivity and credibility • Cybercrime • Hacking • Malware • Phishing • USB drives
Checklist • Training program has been developed • Re-training conducted based on performance • Routine evaluations are conducted • Developed a disaster and recovery plan • Firewalls are in place • Routine virus checking, system audits and diagnostics • Data retention schedule
Checklist • Notation on all records containing identifiable data (e.g. confidentiality reminder) • Telecommuting and home offices • Same level of security • Additional safeguards • Minimal data on home computer • Security Software • Password control • Secure transport from one location to another
Checklist • Open-access area security • Written data not left out in the open • Log out of sessions • Fax/Copy machines • Secure area • Cover sheets • De-program to recover confidential information • Established document disposal procedures • Protection of hard copy information • Written consent to release to outside agencies • Double check before providing information
Resources • PASSHE • National Cyber Security Alliance (NCSA) • http://www.staysafeonline.org