SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Stonehill College

Information Security
  and Identity Theft
Information Security
• Data Security
• Identity Theft
Massachusetts Data Security Law
• M.G.L. 93H
• 201 CMR 17
• Personal Information
  – First name or first initial and last name
       AND
     1. Government Issues I.D. OR
     2. Financial Account Number OR
     3. Social Security Number
Massachusetts Requirements
• Written Policy
  – F9.2 Information Security Policy
• Safeguards
  – Administrative
  – Physical
  – Technical
• Oversight
  – Chief Information Officer
Massachusetts Requirements
•   Identify records with personal information
•   Routinely evaluate our safeguards
•   Regular employee training
•   Contractual assurances
•   Share information on a need to know basis
•   Document a breach
    – Notify Office of the General Counsel
Identity Theft
• Federal Trade Commission
  – Fair and Accurate Credit Transaction Act
  – Red Flag Rules
  – 16 C.F.R. 681
• College is a “creditor” with “covered accounts”
  – Perkins Loan Program
  – Deferred tuition payments
  – Invoices to students
Identity Theft
• Identity Theft: when a person commits or
  attempts to commit a fraud using someone’s
  identity.
• Identity Theft Prevention Program
  – College written document available online, or
  – Request copy from the Office of the General
    Counsel
Identity Theft
• Identity Theft: when a person commits or
  attempts to commit a fraud using someone’s
  identity.
• Identity Theft Prevention Program
  – College written document available online, or
  – Request copy from the Office of the General
    Counsel
Technical Safeguards
adhering to best practices…
Technical Safeguards
• Antivirus
• Central File Share
   – Required for confidential and internal use only
     information
• Virtual Private Network (VPN)
• Identity Finder
   – Delete (shred to DOD standards)
   – Encrypt
• TrueCrypt for Laptops
Technical Safeguards
• Passwords
  – Minimum length of 8 characters
  – At least 4 letters
     • Uppercase and lowercase
  – Mixture of letters, numbers, and other characters
     • Alphanumeric and non-alphanumeric
  – Cannot use your account name
  – Cannot use your last 6 passwords
  – Change them at least every 180 days
Information Security
…an important part of our job…

Weitere ähnliche Inhalte

Was ist angesagt?

Paragon insert i.t. forensic
Paragon insert   i.t. forensicParagon insert   i.t. forensic
Paragon insert i.t. forensicWilliam Grieve
 
FinTech Belgium GDPR MeetUp - Daldewolf - 14/09/17
FinTech Belgium GDPR MeetUp - Daldewolf - 14/09/17FinTech Belgium GDPR MeetUp - Daldewolf - 14/09/17
FinTech Belgium GDPR MeetUp - Daldewolf - 14/09/17Alessandra Gambrill - Guion
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Nawanan Theera-Ampornpunt
 
Business Law & Order - June 18, 2012 - Russ Brown
Business Law & Order - June 18, 2012 - Russ BrownBusiness Law & Order - June 18, 2012 - Russ Brown
Business Law & Order - June 18, 2012 - Russ BrownAnnArborSPARK
 
Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Atika Zaimi
 
Personally owned devices at work
Personally owned devices at workPersonally owned devices at work
Personally owned devices at workERADAR
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital EraFrederick Lane
 
Online architectures
Online architecturesOnline architectures
Online architecturesaladanh22
 
18.10.16 technology first - techcorp shack
18.10.16   technology first - techcorp shack18.10.16   technology first - techcorp shack
18.10.16 technology first - techcorp shackHollyHworth
 
Fulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity TheftFulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity TheftSteve Meek
 
Security Awareness 9-10-09 v5 Sensitive Information
Security Awareness 9-10-09 v5 Sensitive InformationSecurity Awareness 9-10-09 v5 Sensitive Information
Security Awareness 9-10-09 v5 Sensitive InformationCatherine MacAllister
 
E commerce- securing the business on internet
E commerce- securing the business on internetE commerce- securing the business on internet
E commerce- securing the business on internetSandhi Shivanya
 
Human resources: protecting confidentiality
Human resources: protecting confidentiality Human resources: protecting confidentiality
Human resources: protecting confidentiality KelbySchwender
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidancePrivacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpointlydneat
 

Was ist angesagt? (19)

Paragon insert i.t. forensic
Paragon insert   i.t. forensicParagon insert   i.t. forensic
Paragon insert i.t. forensic
 
FinTech Belgium GDPR MeetUp - Daldewolf - 14/09/17
FinTech Belgium GDPR MeetUp - Daldewolf - 14/09/17FinTech Belgium GDPR MeetUp - Daldewolf - 14/09/17
FinTech Belgium GDPR MeetUp - Daldewolf - 14/09/17
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)
 
Business Law & Order - June 18, 2012 - Russ Brown
Business Law & Order - June 18, 2012 - Russ BrownBusiness Law & Order - June 18, 2012 - Russ Brown
Business Law & Order - June 18, 2012 - Russ Brown
 
Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Topic 5.0 basic security part 1
Topic 5.0 basic security part 1
 
Hernandez, Rimsky
Hernandez, RimskyHernandez, Rimsky
Hernandez, Rimsky
 
Personally owned devices at work
Personally owned devices at workPersonally owned devices at work
Personally owned devices at work
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital Era
 
Online architectures
Online architecturesOnline architectures
Online architectures
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
18.10.16 technology first - techcorp shack
18.10.16   technology first - techcorp shack18.10.16   technology first - techcorp shack
18.10.16 technology first - techcorp shack
 
Cyber - Dark Web, Deep Web and More
Cyber - Dark Web, Deep Web and MoreCyber - Dark Web, Deep Web and More
Cyber - Dark Web, Deep Web and More
 
Fulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity TheftFulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity Theft
 
Unit4 cry
Unit4 cryUnit4 cry
Unit4 cry
 
Security Awareness 9-10-09 v5 Sensitive Information
Security Awareness 9-10-09 v5 Sensitive InformationSecurity Awareness 9-10-09 v5 Sensitive Information
Security Awareness 9-10-09 v5 Sensitive Information
 
E commerce- securing the business on internet
E commerce- securing the business on internetE commerce- securing the business on internet
E commerce- securing the business on internet
 
Human resources: protecting confidentiality
Human resources: protecting confidentiality Human resources: protecting confidentiality
Human resources: protecting confidentiality
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidancePrivacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpoint
 

Andere mochten auch

Andere mochten auch (12)

2
22
2
 
Old bethpage clean out
Old bethpage clean outOld bethpage clean out
Old bethpage clean out
 
Malay jeaninc 1
Malay jeaninc 1Malay jeaninc 1
Malay jeaninc 1
 
Visual resume
Visual resumeVisual resume
Visual resume
 
Malay jeaninc 1
Malay jeaninc 1Malay jeaninc 1
Malay jeaninc 1
 
Malay jeaninc 1
Malay jeaninc 1Malay jeaninc 1
Malay jeaninc 1
 
History in movies
History in movies History in movies
History in movies
 
The mathematics used by technicians in the automotive electronics industry.
The mathematics used by technicians in the automotive electronics industry.The mathematics used by technicians in the automotive electronics industry.
The mathematics used by technicians in the automotive electronics industry.
 
Song leader
Song leaderSong leader
Song leader
 
Introduction to lab_view
Introduction to lab_viewIntroduction to lab_view
Introduction to lab_view
 
Pendamping Berdampingan
Pendamping BerdampinganPendamping Berdampingan
Pendamping Berdampingan
 
Seminar bab i
Seminar bab iSeminar bab i
Seminar bab i
 

Ähnlich wie Data security 1

Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
Moving to the Cloud: A Security and Hosting Introduction
Moving to the Cloud: A Security and Hosting IntroductionMoving to the Cloud: A Security and Hosting Introduction
Moving to the Cloud: A Security and Hosting IntroductionBlackbaud
 
Session4807.ppt
Session4807.pptSession4807.ppt
Session4807.ppttalkaton
 
9. Computer Ethics.ppt
9. Computer Ethics.ppt9. Computer Ethics.ppt
9. Computer Ethics.pptasm071149
 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...David Cunningham
 
The "Current" State of Privacy Law
The "Current" State of Privacy LawThe "Current" State of Privacy Law
The "Current" State of Privacy LawChuck Kunz
 
Data Privacy - Updated Slides for Technology Forum of Delaware Presentation
Data Privacy - Updated Slides for Technology Forum of Delaware PresentationData Privacy - Updated Slides for Technology Forum of Delaware Presentation
Data Privacy - Updated Slides for Technology Forum of Delaware PresentationChuck Kunz
 
Introduction to hackers
Introduction to hackersIntroduction to hackers
Introduction to hackersHarsh Sharma
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15E Andrew Keeney
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Asad Zaman
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOAPeter Henley
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a bytelgcdcpas
 

Ähnlich wie Data security 1 (20)

Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Moving to the Cloud: A Security and Hosting Introduction
Moving to the Cloud: A Security and Hosting IntroductionMoving to the Cloud: A Security and Hosting Introduction
Moving to the Cloud: A Security and Hosting Introduction
 
Session4807.ppt
Session4807.pptSession4807.ppt
Session4807.ppt
 
9. Computer Ethics.ppt
9. Computer Ethics.ppt9. Computer Ethics.ppt
9. Computer Ethics.ppt
 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...
 
The "Current" State of Privacy Law
The "Current" State of Privacy LawThe "Current" State of Privacy Law
The "Current" State of Privacy Law
 
Data Privacy - Updated Slides for Technology Forum of Delaware Presentation
Data Privacy - Updated Slides for Technology Forum of Delaware PresentationData Privacy - Updated Slides for Technology Forum of Delaware Presentation
Data Privacy - Updated Slides for Technology Forum of Delaware Presentation
 
Introduction to hackers
Introduction to hackersIntroduction to hackers
Introduction to hackers
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Cyber security
Cyber securityCyber security
Cyber security
 
Hackers
HackersHackers
Hackers
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Cybersecurity Workshop
Cybersecurity Workshop Cybersecurity Workshop
Cybersecurity Workshop
 
CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
 
Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
 
cybersecurity
cybersecurity cybersecurity
cybersecurity
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
 

Kürzlich hochgeladen

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Kürzlich hochgeladen (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Data security 1

  • 2. Information Security • Data Security • Identity Theft
  • 3. Massachusetts Data Security Law • M.G.L. 93H • 201 CMR 17 • Personal Information – First name or first initial and last name AND 1. Government Issues I.D. OR 2. Financial Account Number OR 3. Social Security Number
  • 4. Massachusetts Requirements • Written Policy – F9.2 Information Security Policy • Safeguards – Administrative – Physical – Technical • Oversight – Chief Information Officer
  • 5. Massachusetts Requirements • Identify records with personal information • Routinely evaluate our safeguards • Regular employee training • Contractual assurances • Share information on a need to know basis • Document a breach – Notify Office of the General Counsel
  • 6. Identity Theft • Federal Trade Commission – Fair and Accurate Credit Transaction Act – Red Flag Rules – 16 C.F.R. 681 • College is a “creditor” with “covered accounts” – Perkins Loan Program – Deferred tuition payments – Invoices to students
  • 7. Identity Theft • Identity Theft: when a person commits or attempts to commit a fraud using someone’s identity. • Identity Theft Prevention Program – College written document available online, or – Request copy from the Office of the General Counsel
  • 8. Identity Theft • Identity Theft: when a person commits or attempts to commit a fraud using someone’s identity. • Identity Theft Prevention Program – College written document available online, or – Request copy from the Office of the General Counsel
  • 10. Technical Safeguards • Antivirus • Central File Share – Required for confidential and internal use only information • Virtual Private Network (VPN) • Identity Finder – Delete (shred to DOD standards) – Encrypt • TrueCrypt for Laptops
  • 11. Technical Safeguards • Passwords – Minimum length of 8 characters – At least 4 letters • Uppercase and lowercase – Mixture of letters, numbers, and other characters • Alphanumeric and non-alphanumeric – Cannot use your account name – Cannot use your last 6 passwords – Change them at least every 180 days

Hinweis der Redaktion

  1. This presentation will discuss the College’s polices and protocols concerning information security and explain state and federal requirements that apply to data security and identity theft.
  2. Let’s start with the Massachusetts Data Security law. The Data Security Law is part of the state consumer protection laws and is codified at Chapter ninety three H of the general laws. The corresponding regulations are found at title 201, section 17. This law protects personal information, which the law defines as a person’s first name or initial and their last name in combination with either a government issued identification (like a driver’s license or passport), a financial account number (like a bank account), or their social security number. The law applies to both electronic and paper records. While this presentation will focus more on electronic records and technology, it is important to understand that this law applies equally to a computer file and a physical document.
  3. The law has many requirements that we as employees need to be aware of. The law requires that you have a written security policy. Our written security policy can be found in our on line policy manual. It is policy F nine point two and is entitled Information Security Policy. It is important for employees to be familiar with this policy.The College complies with the law by maintaining administrative, physical, and technical safeguards for protecting personal information. Administrative safeguards mean we have policies and procedures in place. Physical safeguards mean we use reasonable means to limit physical access, for example locks on doors and file cabinets. Technical safeguards mean that we manage our electronic information using reasonable and sound information technology practices; we’ll talk a little more about technical safeguards later in the presentation. The law also requires that we designate someone to oversee this process. The College has designated our Chief Information Officer, who works closely with the Office of the General Counsel to ensure compliance.
  4. Another important requirement of the law is that we need to indentify the records we have that contain personal information. It is important that we are aware of potential security risks and that we routinely evaluate the safeguards we have in place as an individual employee, a department, a division, and as an institution. Regular employee training, like this presentation, is an important part of this process.Protecting personal information is an important part of all of our jobs and it’s a requirement that the College takes seriously. Like other Massachusetts colleges, we have included disciplinary measures within our policies. A violation of the College’s information security policy can result in disciplinary action up to and including termination. For those employees and departments that routinely deal with contracts, the law also requires that we maintain appropriate oversight of our data and ensure that outside vendors that work with our data provide contractual assurances that they can comply with the legal requirements of the data security law. In general, it is a good idea to limit the information you provide to people, even your colleagues in other departments. Information should of course be shared, but we should all be thinking about what information is necessary and avoid sharing more information than is needed. Information should only be shared when it relates to the operations of the College and then only with colleagues that have a legitimate need for the information. If you believe personal information has been compromised, it is very important that we document any breach or potential breach. You should inform your supervisor or your division’s Information Custodian if you suspect a breach. Your supervisor or information custodian will then notify the Office of the General Counsel to ensure that we properly notify the state and the people who may be impacted by the breach.It is important to note that while the Massachusetts law only applies to Massachusetts residents, our policy applies to all people regardless of their residency. For example, even if the breach only involved alumni from New York or prospective students from Vermont, you should report the breach immediately.The law requires that every employee must be trained on these requirements, so thank you for actively listening to this presentation!
  5. Now let’s talk a little about identity theft. The Federal Trade Commission, as part of the Fair and Accurate Credit Transaction Act, has issued the red flag rules. These rules require financial institutions and creditors with covered accounts to have an identity theft program. You might be wondering how that applies to colleges. It applies to colleges because they way the law defines a creditor and a covered account is very broad. And because it is broad most colleges in the country are impacted by the law. For example, we participate in the Federal Perkins Loan Program, so the law is triggered for us in that respect. We offer deferred tuition payments, that’s another reason that the law applies to us, and we also provide invoices for certain transactions with our students.
  6. The red flag rules are identity theft rules. Identity theft is when a person commits or attempts to commit a fraud using someone’s identity. As a covered institution, we need to take reasonable steps to make sure that we know the identity of a person. For example, if a student comes into an office and says they want some information, maybe they’re looking for a transcript or some other document that might have personal information about that student, we have to check and confirm the student’s identity. If the identification they present looks suspect, or if they have no identification, or refuse to show us identification, then the red flag rules will be triggered and you need to report that up the chain to your supervisor or directly to the General Counsel’s office. The College has an Identify Theft Prevention Program. The document explaining our program is available on the College website as well as from the General Counsel’s office. It is a good idea to review this document periodically.
  7. The red flag rules are identity theft rules. Identity theft is when a person commits or attempts to commit a fraud using someone’s identity. As a covered institution, we need to take reasonable steps to make sure that we know the identity of a person. For example, if a student comes into an office and says they want some information, maybe they’re looking for a transcript or some other document that might have personal information about that student, we have to check and confirm the student’s identity. If the identification they present looks suspect, or if they have no identification, or refuse to show us identification, then the red flag rules will be triggered and you need to report that up the chain to your supervisor or directly to the General Counsel’s office. The College has an Identify Theft Prevention Program. The document explaining our program is available on the College website as well as from the General Counsel’s office. It is a good idea to review this document periodically.
  8. Let’s revisit for a moment the requirement that we safeguard our data and let’s focus on how we do this with regard to our technical safeguards. The College tries to adhere to established best practices for the protection of all personal information. Here are some of the ways that we do this:
  9. The College deploys an enterprise solution for antivirus protection called LANDesk. LANDesk is currently installed on all Stonehill computers and provides optimized virus and spyware detection.The College uses a Central File Share service. The service enables secure file storage on the College network for employees. Use of the service is required for confidential and internal use only information, as those terms are defined in our Information Security Policy. It offers convenience, mobility and flexibility by making files centrally accessible on campus or remotely through a virtual private network. A virtual private network is a secure encrypted network connection.Identity Finder is an application used to find and protect personal information stored on your computer. The Identity Finder software has been chosen by the College as the solution for employees to protect against possible identity theft. Identity Finder will search your computer, file shares, and personal media for vulnerable personal information such as social security numbers, credit card numbers, passwords, employee identification numbers, and maiden names. When Identity Finder locates such data, it will then allow a user to completely delete or encrypt it, protecting it from unwanted third party access. Our Information Technology Department also recommends the use of Microsoft Office encryption, available for Word, Excel, or PowerPoint files that contain sensitive or private information.Employees should also note that we use an encryption application for all laptops called True Crypt, which encrypts the entire laptop.
  10. The College also maintains a password policy. Our password policy requires:A minimum length of eight characters; at least 4 letters in a mixture of uppercase and lowercase; that passwords cannot contain parts of your account name or your full name; that you cannot use your previous six passwords; and passwords must contain a mixture of letters, numbers, and other characters.Passwords should not be shared, written down, or sent to others. Our password policy requires a password to be changed at least every 180 days.
  11. So, remember, it is all of our jobs to make sure we protect the information of our students, our employees, our alumni, and of anyone that the College comes in contact with. We want to protect the College and prevent data security breaches.This concludes our presentation.