Ethics and Compliance Program - PowerPoint PPT Presentation

ethics and compliance program l.
Skip this Video
Loading SlideShow in 5 Seconds..
Ethics and Compliance Program PowerPoint Presentation
Download Presentation
Ethics and Compliance Program

play fullscreen
1 / 18
Download Presentation
Ethics and Compliance Program
Download Presentation

Ethics and Compliance Program

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Ethics and Compliance Program Information Security

  2. Understanding… Who’s responsible? What’s information security? Why do we need information security? What’s confidential and what’s not? What do I need to protect? How do I protect information? What are the important policies and laws? Where do I find out more? Information Security

  3. Is it students? Is it faculty? Is it staff? Is it security administrators? The Answer = All of the above, security is everyone’s responsibility! Information SecurityWho’s Responsible?

  4. The protection of data against unauthorized access. This includes: How we access, process, transmit, and store information How we protect devices used to access information How we secure paper records, telephone conversations, and other types of digital media Information SecurityWhat’s Information Security?

  5. Confidential information is entrusted to us Laws and regulations govern the use of some of this confidential information We have an ethical obligation to protect this information from unauthorized access Failure to do so could leave others vulnerable to fraud and other exploits Information SecurityWhy Do We Need Information Security?

  6. Information SecurityWhat’s Confidential and What’s Not? IMPORTANT NOTE: If you receive a request for information from any external party, and you aren’t certain that the information can be released, refer them to the Office of the University Attorney for further action.

  7. Information and RecordsWhat’s Confidential and What’s Not?

  8. Information and RecordsWhat Do I Need to Protect?

  9. The following video is titled “Out in the Open” and was developed by Mark Lancaster, Texas A&M University. It was the second prize winner in the two minute or less category of the EDUCAUSE 2007 Computer Security Awareness Video Contest. Make sure your sound is turned up and CLICK ON THE LINK BELOW TO PLAY “Out in the Open” video Information SecurityProtect Yourself – A Video

  10. Share confidential information only with other employees who have a need for the information When in doubt, don't give it out! If you are unsure whether or not to disclose certain information, err on the side of caution and don't release it Keep confidential phone conversations and dictation from being overheard Quickly retrieve or secure any document containing protected information that you have printed, scanned, copied, faxed, etc. Information SecurityHow Do I Protect Information?

  11. Store documents or physical media containing confidential information in locking file-cabinets or drawers Delete and write over (i.e., "wipe") data from any electronic media before transferring or disposing of it. Ask your IT support person for assistance Position computer screens so they're not visible to anyone but the authorized user(s) Information SecurityHow Do I Protect Information?

  12. Shred paper documents and/or CDs containing confidential information before disposal, and secure such items until shredding Be alert to fraudulent attempts to obtain confidential information and report these to management for referral to appropriate authorities Log out or lock your workstation when you walk away from your work area Use strong passwords; don’t share them At least 8 or more characters long Mix alpha, numeric, & special characters; upper & lower case Don’t include dictionary words or proper names Don’t re-use all or a major portion of a prior password Information SecurityHow Do I Protect Information?

  13. Information SecurityHow Do I Protect Information? • Use anti-virus software and leave auto-update enabled or update your virus definitions regularly • The following video, “Virus Software” is by Andrew Centafonte, Doug Standford, Jill Verillo, & Lindsey Wilson, James Madison University and received Honorable Mention in EDUCAUSE'S 2006 Computer Security Awareness Video Contest. • Make sure your sound is turned up and • CLICK ON THE LINK BELOW TO PLAY • “Virus Software” video

  14. Texas State University Policies Appropriate Use of Information Resources (UPPS 04.01.07) Security of Texas State Information Resources (UPPS 04.01.01) Appropriate Release of Information (UPPS 01.04.00) Texas State policy requires that information resources be used only in support of University missions Information SecurityWhat Are the Important Rules and Laws?

  15. FERPA – Federal Educational Rights & Privacy Act is a federal law that protects the privacy of student educational records, and prohibits the University from disclosing information from those records without the written consent of the student HIPAA – Health Insurance Portability & Accountability Act is a federal law that: Protects the privacy and security of Protected Health Information (PHI) and Electronic Protected Health Information (ePHI) Gives patients more control over their health records Sets limits on the accessibility and disclosure of patient health information Information SecurityWhat Are the Rules and Laws?

  16. Gramm-Leach-Bliley Act (GLBA) includes provisions to protect the security and confidentiality of a consumers' personal financial information held by financial institutions - in any form or medium Universities/agencies must not disclose any non-public, financial information to anyone except as permitted by law TPIA – Texas Public Information Act formerly known as the Open Records Act, specifies that all recorded information owned or accessed by a governmental body is presumed to be public information, with certain exceptions Information SecurityWhat Are the Rules and Laws?

  17. Texas State Sites IT Security - Privacy Rights Notice - Identity theft - FERPA at Texas State - Contacts Information Technology Security 512-245-HACK(4225), Information Technology Assistance Center (Help Desk) 512-245-ITAC(4822) or 512-245-HELP, Information SecurityHow Do I Find Out More?

  18. Quit Power Point & go to the Contracts and Agreements Review Questions • Restart Contracts & Agreements Module. • Quit Power Point & return to the Compliance Module Menu.