Welcome Personally Identifiable Information (PII) Protection Training for Data StewardsSlide 2
Goal The reason for now\'s preparation project is to acquaint you with an accumulation of strategies intended to secure Personally Identifiable Information (PII) and to your part and duties as a Data Steward. Information Steward TrainingSlide 3
Learning Objectives: As a consequence of taking part in today\'s project you will: Learn about Loyola\'s Personally Identifiable Information (PII) Protection program Gain a superior comprehension of your part and duties as a Data Steward Acquire a rundown of instruments and assets that can bolster you in your part as a Data Steward Data Steward TrainingSlide 4
Agenda The Challenge of Protecting PII Loyola\'s Process for Protecting PII Your Role in Protecting Loyola\'s PII Tools and Resources Data Steward TrainingSlide 5
Guidelines Program length: a hour Ask questions – take an interest Data Steward TrainingSlide 6
Protecting Personally Identifiable Information Data Steward TrainingSlide 7
Data Steward Training Loyola as of late endorsed arrangements covering territories: Data Classification Loyola Protected & Sensitive Data Identification Physical Security of Loyola Protected & Sensitive Data Electronic Security of Loyola Protected & Sensitive Data Disposal of Loyola Protected & Sensitive Data Loyola Encryption Compliance Review Data Breach ResponseSlide 8
Data Steward Training All information delivered by representatives of Loyola University Chicago over the span of University business will be named one of these three sorts of information: Loyola Protected Data Loyola Sensitive Data Loyola Public Data (Definitions on next slide)Slide 9
Definitions Loyola Protected information (LPro information) Protected by Federal, state, or neighborhood laws Includes SSNs, charge card numbers, financial balance data, driver\'s permit numbers, individual wellbeing information, FERPA information, and so forth Loyola Sensitive information (LSen information) Not secured by laws, however data that Loyola would not convey to the general population Determined by the division that made the information Loyola Public information (LPub information) Information that Loyola is happy with dispersing to the overall population. Information Steward TrainingSlide 10
Role & Responsibilities for Data Stewards Data Steward TrainingSlide 11
The essential duty of an information steward is to help their specialty recognize areas of Personally Identifiable Information (PII) The information steward will likewise deliver documentation utilized by ITS and your specialization demonstrating where PII is situated in the office Data Steward TrainingSlide 12
Responsibilities Identify PCs that store or get to Loyola Protected or Loyola Sensitive information Conduct frameworks filter like clockwork Use programming checking apparatus that banners conceivable LPro data Record data from the examining programming device in a spreadsheet for ITS and your specialty Fill out the office\'s Data Security Compliance Review shape and submit to ITS Data Steward TrainingSlide 13
Responsibilities Act as an asset for your specialization by giving data about the strategies and their effect Conduct presentations as expected to bring issues to light Sample presentation: http://www.luc.edu/its/pdfs/dspresentation.ppt Data Steward TrainingSlide 14
Changes in how your specialty handles Loyola information Data Steward TrainingSlide 15
Changes for Paper archives Limit access to office workspaces that store LPro or LSen information in paper structure – your specialization ought to: Create a rundown of people with access to confined ranges; give Campus Security a duplicate of the rundown Require an identification or key to get to those regions Allow no free to those regions Acquire/use endorsed shredders to discard records Limit access to printers and faxes Properly store LPro or LSen archives; abstain from leaving LPro or LSen data on work areas and other work territories when nobody is available Data Steward TrainingSlide 16
Changes for electronic archives Restrict access to PCs and other electronic gadgets that store LPro or LSen information in electronic structure LPro or LSen information can\'t be put away on PCs or electronic gadgets that are not scrambled ITS will give directions to introducing the encryption programming for those clients that need it Data Steward TrainingSlide 17
Preferred stockpiling for remote access LPro or LSen information favored capacity for remote access Network drives (VPN + Remote Desktop) Laptop w/encryption programming PDA/Blackberry/Smartphone w/encryption programming Portable drive w/encryption programming CD/DVD/plate as an encoded document Data Steward TrainingSlide 18
Disposal of LPro or LSen information Paper – Shred either through destroying administration or affirmed individual shredder (Purchasing has rundown of affirmed shredders) Electronic – Contact ITS for legitimate transfer If taken outside of Loyola, either discard as above or take paper/gadget back to Loyola for appropriate transfer Data Steward TrainingSlide 19
Encryption of information Electronic information exchanges must be secured If you have to send touchy information by means of email, please contact ITS for data on sending encoded messages LPro or LSen information on physical media (CD, convenient drive, and so on) must be encoded ITS will help with arrangement and preparing for office particular issues on an as-required premise Data Steward TrainingSlide 20
Report conceivable ruptures/exposures Call 86086/773-508-6086 Email firstname.lastname@example.org Go to unknown reporting page at http://www.luc.edu/its/security/data_security_form_anonymous.shtml Data Steward TrainingSlide 21
Split into 4 stages ITS pilot Sullivan Center pilot High-hazard regions (HR, Finance, and so on) Rest of the college Main correspondence exertion will happen before the 4 th stage – college wide organization University Deployment PlanSlide 22
Town lobby gatherings Inside Loyola Weekly Separate email impact to all staff Communications particularly focusing on workforce Communication StrategySlide 23
Give a presentation to my specialization about this? Play out the filtering bit? Introduce the encryption programming? Round out the printed material? Get different inquiries replied? How Do I … ?Slide 24
Give a presentation to whatever remains of my specialty? Suggested so they will have a superior comprehension of how they can secure PII and other delicate information Complete presentation accessible at http://www.luc.edu/its/pdfs/dspresentation.ppt Please send any inquiries you can\'t reply to ITS ( DataSecurity@luc.edu or x86086) How Do I… ?Slide 25
Perform the checking segment? Send an email to everybody in your area of expertise requesting that they go to Loyola Software - > Useful Tools - > Spider Scanner This will introduce and run the filtering programming The procedure can take a hour or two, yet the client can keep utilizing their machine while it works Program will naturally close when done How Do I… ?Slide 26
Install the encryption programming? Close all open projects Go to Loyola Software - > Useful Tools - > SafeGuard Easy Install Machine reboots a few times Login, sit tight for machine to reboot twice all the more Close encryption picture and login Verify red symbol on hard drive, logout or lock machine yet LEAVE IT POWERED ON! You can utilize your PC while it scrambles, however it will run all the more gradually until the procedure finishes How Do I… ?Slide 27
Fill out the printed material? Two unique structures to finish While checking on the arachnid log with the client, round out the PII Tracking.xls spreadsheet Once the sum total of what PCs have been filtered and their logs audited, round out the Data Security Compliance Review structure accessible at http://luc.edu/its/pdfs/gov_PIIP/Personal%20Information%20Protection%20Compliance%20Review.pdf (the last page) How Do I… ?Slide 28
Get different inquiries replied? Call/Email/Stop By Joe Bazeley email@example.com DataSecurity@luc.edu 773-508-6086/86086 Granada Center room 235 How Do I… ?Slide 29
Tools and Resources ITS Contact Joe Bazeley firstname.lastname@example.org 773-508-6086/86086 Policies Presentation – include joins Reporting breaks Anonymous reporting page at http://www.luc.edu/its/security/data_security_form_anonymous.shtml Email email@example.com Data Steward TrainingSlide 30
As a Data Steward you assume an essential part in guaranteeing that your specialty is in and stays in consistence with Loyola\'s strategies for ensuring PII and other touchy data SummarySlide 31
Responsibilities Be an asset to your specialization by giving data about these arrangements and their effect Sample presentation accessible at http://www.luc.edu/its/pdfs/dspresentation.ppt Conduct sweeps of division media at regular intervals Check yield of LPro/LSen information location instrument on every individual\'s PC Provide synopsis data on LPro/LSen information to ITS and your specialty Fill out office\'s consistence structure for ITS SummarySlide 32
Badge/key access limitations Printers and faxes in secure ranges Use endorsed shredders Secure work area when not around Encryption of PCs Cannot store LPro or LSen information on decoded PCs Store documents on system drives for remote access SummarySlide 33
Questions? Information Steward TrainingSlide 34
Thank you for Your interest Data Steward TrainingSlide 35
Short form of introduce procedure: Close open reports Launch program Wait a few minutes, login Wait a few minutes, close picture then login again Log out or bolt PC, yet abandon it fueled on Full Disk Encryption Install Demo
For computerized indicators, higher dosages result in a superior picture quality (less
HIPAA protection rules HIPAA approval is attached to unique exploration assent ... Issues Relate ...
How Grace Transforms The Church 1 Corinthians 4:116 getting to be profound grown-ups part #3 t ...
PC Hardware. ISQS 6343. John R. Durrett. Why PCs. Universal. Effective. Versatile to numerous ap ...
Optimizing abilities acknowledgment in flame security industry. Virginia Krumins Fire Protection ...
Draft Guidelines on Health Research. Counsel on Personal Data use for Health Research ... Where ...
Onlooker records can be a valuable apparatus in helping examiners with dissecting ... In any cas ...
Wicca is one of the quickest developing cultic developments not just in North America, ... At th ...
Any individual from anyplace in Australia can contact the helpdesk by means of telephone or ... ...
2. What is Data Protection about?. Counteract mischief to the people whose information we hold, ...
2. Solid business action in 2008. Sound capital base and safe liquidityStrategy for pointing mor ...
15.2: Optimization of insurance in radiography: Radioprotection viewpoints. 2. Presentation. Enh ...
HIM 2200. Release of Information. Release of Information. Release of Information (ROI) is t ...
Head Protection (Hard Hats). The accompanying subjects will be secured:. Head Hazards Types of H ...
Review. General review of the DPA 1998DefinitionsChanges since 1984 ActSensitive Personal Data
Course Outline. Presentation Fall Protection Ladder Safety Wrap-up . . . Presentation. More than ...
2. The Privacy Rule. Makes national establishment of privacyDoes not seize more stringent state ...