280 likes | 436 Views
Legal Issues for Supervisors 401. How to Protect the Confidentiality and Security of Private Information on W&L and its Constituents. What’s this all about?. Three separate issues: What is PRIVATE (personally identifiable information protected by law, policy, or common civility);
E N D
Legal Issues for Supervisors 401 How to Protect the Confidentiality and Security of Private Information on W&L and its Constituents (C) Washington & Lee University 2007
What’s this all about? • Three separate issues: • What is PRIVATE (personally identifiable information protected by law, policy, or common civility); • How to keep PRIVATE information CONFIDENTIAL (seen/heard by only those with a legitimate need to know); and • How to keep such information SECURE (so that it cannot be improperly altered, removed, or destroyed). (C) Washington & Lee University 2007
Private information under law • Student education records (FERPA); • Financial account/loan records (Gramm Leach Bliley) [student loans, employee home loans]; • Personally identifiable employee information kept by covered health plans (HIPAA) [health, dental, flex, EAP] (C) Washington & Lee University 2007
Private information under law • Records related to employee disability (Americans with Disabilities Act) [kept separate from rest of personnel file]; • Medical records related to family and medical leave (FMLA) and workers’ compensation; • Background Check results (disposal) (FACTA) • Student medical treatment / counseling records (private under Virginia law) • Human Subjects Research (surveys, etc.) (C) Washington & Lee University 2007
Private information under policy • Social security numbers and credit card numbers are included in W&L’s Information Security Program. (C) Washington & Lee University 2007
Other private W&L information • Personally identifiable information re: donors, alumni and alumnae. • Proprietary W&L information (internal operations, financial/investments, research and institutional data not intended for public disclosure) (C) Washington & Lee University 2007
Risks to private information • Unauthorized access or transfer • Disclosure beyond authorized request • Improper disclosure based on unauthorized request • Physical loss or destruction • Alteration/corruption • Improper interception • Other security compromise (C) Washington & Lee University 2007
For example . . . (C) Washington & Lee University 2007
Responsibilities of all W&L employees • All university faculty, staff, student workers, and volunteers are expected to comply with university policies and procedures on privacy, confidentiality and security. • New employees (faculty & staff) sign confidentiality and technology use agreements. Extend to all, including student workers? (C) Washington & Lee University 2007
What should supervisors do to protect the confidentiality and security of private information? • Stress importance of sound information confidentiality and security practices to all employees. • Practice what you preach - - if you have no legitimate work-related or educational reason to access, disclose, or maintain information, don’t. (C) Washington & Lee University 2007
What should supervisors do to protect the confidentiality and security of private information? • See that your staff receives training and resources on policies, procedures, and best practices for handling private information (use OGC as resource). • Be sure that only those in your department with a legitimate, work-related need to know have authority and access to private information. (C) Washington & Lee University 2007
What should supervisors do to protect the confidentiality and security of private information? • Pay attention to provisions on confidentiality/security in vendor contracts where relevant (see OGC - - contract policy in development). • Notify University Computing of lost or stolen laptops, flash drives, etc. and Telecommunications Manager for stolen phones, blackberries, etc., and coordinate in advance with HR in the event of a termination. (C) Washington & Lee University 2007
How to protect the confidentiality of private information - - general employee guidance • When in doubt, ask / confirm first before disclosing or accessing private information. • Don’t assume that just because you can access/disclose information, you should. • Disposal of documents with private information - - internal or external shredding - - other? (C) Washington & Lee University 2007
How to protect the confidentiality of private information • Don’t leave private information in plain view when leaving your work area. • Lock file cabinets containing private information. • Keep your office locked when you, or other authorized employees, are not present. • Avoid multiple copies of private information unless needed. (C) Washington & Lee University 2007
How to protect the confidentiality of private information • Don’t discuss private or sensitive information with open doors or in hallways, etc. • Treat private information as if it were about you. • Taking files home - - handle with care. (C) Washington & Lee University 2007
Protecting electronic information • Password security: • 8 characters, alphanumeric • Change it often • Don’t share it with anyone • Don’t write it down and tape it close by • Give proxy to e-mail or calendar, not password to the account (C) Washington & Lee University 2007
Protecting electronic information • Lock your workstation each time you leave it unattended (Ctrl/Alt/Delete) • Shut down your computer each evening (allows patches and updates to apply AND keeps others off the computer) • Keep anti-virus/firewalls, etc. up to date on home computers if you work at home • Have multiple user names/pws (C) Washington & Lee University 2007
Protecting electronic information • Safe e-mail practices: • Don’t open attachments if you aren’t expecting them • Don’t click on links in emails • Safe internet browsing: • Don’t click on it if you didn’t ask for it • Don’t allow random downloads • Safe instant messaging (AOL viruses): • Only communicate with known buddies (C) Washington & Lee University 2007
Protecting electronic information • Consider placement of screen / visibility to office visitors • Use screen blockers • Be careful with flash drives, memory keys, diskettes, CDs, etc. (C) Washington & Lee University 2007
What about when traveling? • Assume NOTHING is secure!!! • Wired is more secure than wireless • Always look for the encrypted (lock or equivalent) symbol to be sure communication is secure • Wireless off campus - - don’t do log ins to other sites unless encrypted (C) Washington & Lee University 2007
What about while traveling? • Never user hotel lobby computers for anything sensitive or private - - only map quest type inquiries, etc. • Why? Keystroke loggers . . . Scary . . . (C) Washington & Lee University 2007
Specific private information • Student educational records (FERPA) • Know policy / guidance • http://registrar.wlu.edu/policies/ferpa.htm • Consent, unless school official with legitimate educational interest, subpoena, emergency, few other exceptions • Directory information – unless opt out • Resources – Registrar, counsel.wlu.edu (C) Washington & Lee University 2007
Specific private information • HIPAA • Records kept by W&L health plans on employee medicals, claims, etc. • Group health, Flex, Dental, EAP • Deborah Stoner and Steven McClure are authorized officials (HR) • http://humanresources.wlu.edu/other/Benefit%20Plan%20Privacy%20Practices.htm (C) Washington & Lee University 2007
Specific private information • Background check information (FACTA) • Disposal of such information • ADA/FMLA • Faculty staff medical information related to disability accommodations or family/medical leave - - should be kept separate from personnel file (HR Office - - avoid duplicates in department) (C) Washington & Lee University 2007
Specific private information • Personally identifiable financial information (finances, social security number, credit card) (GLB + W&L policy) • Treasurer’s office • HR • Financial Aid • Business Office • Bookstore, Alumni Office, Special Programs, Development, etc. (C) Washington & Lee University 2007
Information Security Program • Internal inventory of department information security practices to identify and address any potential security concerns. FEDERAL LAW MANDATE. • Will begin with Financial Aid, Treasurer’s Office, Business Office, HR, and other offices maintaining social security numbers or credit card numbers. (C) Washington & Lee University 2007
Required Information Security Program risk assessment • Interactive web-based risk asessment tool: http://law.wlu.edu/administration/surveys/financial.asp • Supervisor or knowledgeable designee should complete. Questions? Contact Jennifer Kirkland, Associate General Counsel (x8929). • If you have no financial information, or SSN#s or credit card #s, just say no. (C) Washington & Lee University 2007
What to do in case of improper disclosure or other security breach • Notify Office of General Counsel, Ruth Floyd (University Computing) (if IT-related), and Scott Dittman (Chair, Information Security Program Committee) (C) Washington & Lee University 2007