Bof 5
This presentation is the property of its rightful owner.
Sponsored Links
1 / 28

BOF#5 PowerPoint PPT Presentation


  • 134 Views
  • Uploaded on
  • Presentation posted in: General

BOF#5. SECURITY AND PRIVACY ISSUES Wednesday December 1, 2010. Bridget-Anne Hampden Deputy Chief Information Officer FEDERAL STUDENT AID U.S. Department of Education. The Top 10 Most Dangerous Places for Your SSN. The Top 10 Most Dangerous Places for Your SSN, cont. The Motivation.

Download Presentation

BOF#5

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Bof 5

BOF#5

SECURITY AND PRIVACY ISSUES

Wednesday

December 1, 2010


Bof5

Bridget-Anne Hampden

Deputy Chief Information Officer

FEDERAL STUDENT AID

U.S. Department of Education


The top 10 most dangerous places for your ssn

The Top 10 Most Dangerous Places for Your SSN


The top 10 most dangerous places for your ssn cont

The Top 10 Most Dangerous Places for Your SSN, cont.


The motivation

The Motivation


Foundation for protecting pii

Foundation for Protecting PII


A quick look at the headlines

A Quick Look at the Headlines


General discussion

General Discussion

  • University PII Checklist

  • GA PII Checklist


University pii checklist

University PII Checklist


University pii checklist i leadership

University PII Checklist(I. Leadership)


University pii checklist ii privacy risk management compliance documentation

University PII Checklist(II. Privacy Risk Management & Compliance Documentation)


University pii checklist ii privacy risk management compliance documentation continued

University PII Checklist(II. Privacy Risk Management & Compliance Documentation, continued)


University pii checklist iii information security

University PII Checklist(III. Information Security)


University pii checklist iii information security continued

University PII Checklist(III. Information Security, continued)


University pii checklist iv incident response

University PII Checklist(IV. Incident Response)


University pii checklist v notice and redress for individuals

University PII Checklist(V. Notice and Redress for Individuals)


University pii checklist vi privacy training awareness

University PII Checklist(VI. Privacy Training & Awareness)


University pii checklist vii accountability

University PII Checklist(VII. Accountability)


Ga pii checklist

GA PII Checklist


Ga pii checklist data privacy policies

GA PII Checklist(Data Privacy / Policies)


Ga pii checklist data privacy policies continued

GA PII Checklist(Data Privacy / Policies, continued)


Ga pii checklist systems applications access

GA PII Checklist(Systems / Applications Access)


Ga pii checklist risk assessment

GA PII Checklist(Risk Assessment)


Ga pii checklist centralized logging and review

GA PII Checklist(Centralized Logging and Review)


Ga pii checklist change management control

GA PII Checklist(Change Management / Control)


Ga pii checklist disaster recovery business continuity

GA PII Checklist(Disaster Recovery / Business Continuity)


Ga pii checklist physical security

GA PII Checklist(Physical Security)


Contact information

Contact Information

  • We appreciate your feedback and comments. We can be reached at:

  • Phone: 202-377-3508

  • Email: [email protected]


  • Login