/
IU Data  Protection & IU Data  Protection &

IU Data Protection & - PowerPoint Presentation

calandra-battersby
calandra-battersby . @calandra-battersby
Follow
349 views
Uploaded On 2018-11-25

IU Data Protection & - PPT Presentation

Privacy Tutorial IU Data Protection amp Privacy Tutorial 1 Overview As an employee of Indiana University YOU have a responsibility to protect the data you come in contact with every day ID: 733680

privacy data protection amp data privacy amp protection university indiana tutorial information access email handling restricted health critical classifications

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "IU Data Protection &" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

IU Data Protection & Privacy TutorialSlide2

IU Data Protection & Privacy Tutorial

1

Overview As an employee of Indiana University, YOU

have a responsibility to

protect

the

data you come in contact with every day. This tutorial is intended to provide you with an understanding of:The types of data IU collects and how it is classifiedYour data handling responsibilitiesThe basic privacy laws you must comply with as an employee of the university

Data Protection & Privacy INDIANA UNIVERSITYSlide3

IU Data Protection & Privacy Tutorial

2

IU DataHere at IU, we collect and store many types of data in the course of our daily business. Some examples are . . .

student information

employment records

research information

personal health information (PHI)vendor informatione-commerce Data Protection & Privacy INDIANA UNIVERSITYSlide4

IU Data Protection & Privacy Tutorial

3

IU DataIU’s students, parents, employees, alumni, donors, and other constituents expect that the data provided to IU will be protected and handled appropriately.

So, how do I protect IU data???

Data Protection & Privacy INDIANA UNIVERSITYSlide5

IU Data Protection & Privacy Tutorial

4

You can protect IU data by . . . #1 – Knowing how IU classifies data #2 – Handling Data Appropriately

#3 – Adhering to data access principles

#4 – Knowing Privacy Laws, Regulations & Policies

#5

– Taking ResponsibilityData Protection & Privacy INDIANA UNIVERSITYSlide6

IU Data Protection & Privacy Tutorial

#1-Data Classifications INDIANA UNIVERSITY5

#1 – Know how IU classifies dataThere are four data classifications

to define the access, handling, and proper disposal of data.

Public

University Internal

Restricted CriticalSlide7

IU Data Protection & Privacy Tutorial

6

Public Data that has few or no restrictions for access, disclosure, and disposal such as: Schedule of

classes

Course Catalog

E

mployee salary informationEmployee business phone or office assignment#1-Data Classifications INDIANA UNIVERSITYSlide8

IU Data Protection & Privacy Tutorial

7

University Internal Data that may be accessed by employees & designated appointees of the university in the conduct of university business, such as:

University ID

Basic building floor plans

Tenure recommendations

#1-Data Classifications INDIANA UNIVERSITYSlide9

IU Data Protection & Privacy Tutorial

8

Restricted Data that requires specific authorization to access or disclose. Secure disposal is required.

Examples include:

Student

class

schedule, advising notes, and grades Full date of birth, ethnicity, citizenshipEmployee address and home phone #1-Data Classifications INDIANA UNIVERSITYSlide10

IU Data Protection & Privacy Tutorial

9

Critical Data that requires authorization to access and the highest level of protection

!

Inappropriate handling of this data can result in personal criminal or civil penalties. Secure disposal is required!

This would include things like:

Social Security numberDriver’s license numberBanking and credit card account numbers Personal health information (PHI)

#1-Data Classifications INDIANA UNIVERSITYSlide11

IU Data Protection & Privacy Tutorial

#2-Appropriate Data Handling INDIANA UNIVERSITY10

#2 – Handle Data AppropriatelyIn addition to understanding IU data classification, it is important for you to know how to…

Access

data appropriately

Share

IU data securelyStore IU data securelyTransmit IU data securelyDispose of IU data securelySlide12

IU Data Protection & Privacy Tutorial

11

Protect your IU Passphrase!Never share it with anyone

Never

use it for other applications and services not approved by the university

Always say “

NO” if prompted to save in memoryDo change it at least every 2 years If you suspect your passphrase has been compromised, do change it as soon as possible and report it to it-incident@iu.edu immediately.#2-Data Handling - Access (Passphrase) INDIANA UNIVERSITYSlide13

IU Data Protection & Privacy Tutorial

12

Protect your Accounts!Set your screen to auto lock on all systems and devices

Utilize

passcodes

on all mobile devices (smart phones, tablets, etc.) Encrypt mobile devices that store institutional data and/or critical mission systemsGet technical assistance from the Knowledgebase or your Local Service Provider (LSP).#2-Data Handling – Access (Accounts) INDIANA UNIVERSITYSlide14

IU Data Protection & Privacy Tutorial

13

Share Information SecurelyYou may need to transfer or share information externally as part of your job. Three secure methods for sharing restricted data include:Slashtmp.iu.edu

for

all classifications of data including

critical data

Box Entrusted Data Account for restricted data Box Health Data Account for protected health information (PHI) and some restricted data#2-Data Handling – Share Securely INDIANA UNIVERSITYSlide15

IU Data Protection & Privacy Tutorial

14

Use Email AppropriatelyDo NOT send restricted and critical data via email unless:Your role requires it AND

Email will:

stay

within IU (does not include

Imail/Umail) ORbe encrypted by the Cisco Registered Envelope Service (CRES) Never ask an external party to transfer critical information to you via email

(ex. social security

card,

driver’s license, visa, tax returns, banking information, etc.)

#2-Data Handling – Sharing with Email INDIANA UNIVERSITYSlide16

IU Data Protection & Privacy Tutorial

15Encrypt email

When you need to encrypt an email message using CRES Cisco Registered Envelope Service include the words:

Secure

Message

OR

Confidential in the Subject line of the email message#2-Data Handling – Sharing with Email INDIANA UNIVERSITYSlide17

IU Data Protection & Privacy Tutorial

16Don’t Fall for Phishing

ScamsIU will never request your passphrase, SSN or confidential information via email.Be suspicious

of email that asks you to enter or verify personal information thru a website or by replying to the message itself.

Not sure? Here are some tips to keep you from getting hooked:

Are you expecting an email of this nature (e.g., password reset, account expiration, wire transfer, travel confirmation, etc.)?

Does the email ask for personal info (password, credit cards, SSN, etc.)?When hovering over links, do the hover-text link match the actual text? Do the actual links look like sites you do business with?Click “Reply.” Does the address in the "To" field match the sender?

If

from an IU

email

account, does the header include “external-relay.iu.edu”? If so, it’s likely

not

coming from a legitimate IU sender.

Still not sure? Want to report an attack?

Send

the

email message

along with 

full email headers

to

phishing@iu.edu

.

#2-Data

Handling-Share Info Securely INDIANA UNIVERSITYSlide18

IU Data Protection & Privacy Tutorial

17

Never Store Sensitive Data

In email

Longer than

requiredOn a webserver used to host a web site open to the publicOn your mobile devices (laptop, USB flash drive, tablet, smartphone) unless the information is properly encrypted and you have written approval from the senior executive of your unit

#2-Data Handling – Storing Securely INDIANA UNIVERSITYSlide19

IU Data Protection & Privacy Tutorial

18

Storage Options at IUIntelligent Infrastructure–all data classifications

Slashtmp

– all data classifications

Entrusted Box – restricted data or less (no critical data)

Health Data Box – ePHI critical data and some restricted or lessSharepoint – restricted data or less (no critical data)Canvas – restricted data or less (no critical data)OnBase – all data classificationsSecure IU file server – to be assessed by DepartmentAsk questions if you are unsure of where to store sensitive information!

#2-Data Handling – Storing Securely INDIANA UNIVERSITYSlide20

IU Data Protection & Privacy Tutorial

19

Working Securely from off CampusVirtual Private Network (VPN) connectionMany IU resources require

a Virtual Private Network (VPN) connection

if you're accessing

services

from off campus. IU offers both SSL and IPsec VPN connections. If you're unable to access a standard resource or tool you use on campus, connect to VPN and try again. For more info see Basics of VPN in the kb article: https://kb.iu.edu/d/ajrqSafety tip: Do not access sensitive data when utilizing a public network without encryption.

#2-Data Handling – Transmitting Data INDIANA UNIVERSITYSlide21

IU Data Protection & Privacy Tutorial

20

Proper DisposalCross-shred paper containing critical and restricted data when no longer required for business Shred Failed devices and media containing sensitive data including laptops/phones

Check with your campus on what shredding services are available locally (such as IU

S

urplus

Stores)#2-Data Handling – Proper Disposal INDIANA UNIVERSITYSlide22

IU Data Protection & Privacy Tutorial

#3-Data Access Principles INDIANA UNIVERSITY21

Access data only to conduct university businessDo not access data for personal profit or curiosity

Limit access to the minimum amount of information needed to complete your task

Respect the confidentiality and privacy of individuals whose records you access

Do not share IU data with third parties unless it is part of your job responsibilities

and has been approved by the appropriate data stewardsAsk questions when you are unsure about data handling procedures #3 Adhere to Data Access PrinciplesSlide23

IU Data Protection & Privacy Tutorial

22

#4 Know Privacy Laws, Regs, PoliciesEvery

IU employee

should also be

aware

of the following federal privacy regulations:The Family Educational Rights and Privacy Act (FERPA) generally prohibits the disclosure of student education records without the prior written consent of the student.The Health Insurance Portability and Accountability Act (HIPAA) imposes numerous, strict privacy and security requirements on protected health information.

#4-Laws, Regs & Policies INDIANA UNIVERSITYSlide24

IU Data Protection & Privacy Tutorial

23

FERPAStudent educational records are protected by FERPA and must be restricted to school officials that have a legitimate educational interest to access the information.

IU’s

Release of Student Information Policy

details the procedures that IU follows to provide appropriate access to student records in compliance with FERPA.

For more information, see USSS Student Data Management- FERPA Information or contact the Student data steward at

datastu@indiana.edu.

#4-Laws, Regs & Policies (FERPA) INDIANA UNIVERSITYSlide25

IU Data Protection & Privacy Tutorial

24

HIPAA

The

HIPAA Privacy Rules protects

all “individually identifiable health information”

held or transmitted by a “covered entity,” regardless of medium. The Privacy Rule calls this information “protected health information (PHI).”#4-Laws, Regs & Policies (HIPAA) INDIANA UNIVERSITYSlide26

IU Data Protection & Privacy Tutorial

25

HIPAAThe vast majority of IU units should maintain no

personal health information (PHI) whatsoever

. If you are in a unit other than the HIPAA Affected Areas (e.g., Student Health Centers, Schools of Medicine, Dentistry, Nursing, and Optometry), and you encounter records that constitute PHI, you should contact the

University HIPAA Privacy and Security Compliance Office

for guidance. #4-Laws, Regs & Policies (HIPAA) INDIANA UNIVERSITYSlide27

IU Data Protection & Privacy Tutorial

26

Indiana LawIndiana data protection laws also help safeguard

data!

Indiana law…

Makes

it a crime to disclose more than the last four digits of someone’s social security number to someone outside of the university (unless specific exceptions apply)

Requires

IU to notify

anyone whose

personal information is

acquired by

an unauthorized

person

P

rovides

guidance on the proper disposal of sensitive information.

#4-Laws, Regs & Policies (State) INDIANA UNIVERSITYSlide28

IU Data Protection & Privacy Tutorial

27

Reporting an IncidentAll individuals are required to immediately report the following:

Suspected

or actual

security breaches of information

Abnormal systematic unsuccessful attempts to compromise informationSuspected or actual weaknesses in the safeguards protecting information You should notify UISO by phone (call until you get to a human) AND you should email it-incident@iu.edu

#5-Take Responsibility - Reporting INDIANA UNIVERSITYSlide29

IU Data Protection & Privacy Tutorial

28

Data Protection is a PriorityThanks for taking a moment to review your

data responsibilities and please

make it a priority

to protect the IU data you manage in your daily work!

Additional resources on data protection and privacy can be found at:http://datamgmt.iu.edu/https://protect.iu.edu/ #5-Take Responsibility - Priority INDIANA UNIVERSITYSlide30

IU Data Protection & Privacy Tutorial

29

A Final NoteTo be entrusted with access to Indiana University data and systems, employees must accept responsibility for, and stay informed of, IU policies and standards of acceptable use, as affirmed in the Acceptable Use Agreement, on a biennial basis. If you have not reviewed the agreement or attested to it in the last 24 months, please take a moment to review it. Also, please note that additional system access may have other training requirements, such as

FERPA

and

HIPAA

compliance training. This tutorial does not replace these requirements. #5-Take Responsibility – Use Agreement INDIANA UNIVERSITY