SlideShare una empresa de Scribd logo
1 de 23
Managing IT Security for Extension and Outreach Offices Theresa Semmens NDSU Chief IT Security Officer October, 2009
     Presentation Outline Security Guidelines Email Workstation Wireless External Mobile Device Security Protection of Confidential and Private Data Online Financial Transactions Those *!@&$ NDSU network services Dual Support with the ND Association of Counties
   NDSU E-mail What is secure Encrypted User name and password  Email messages and attachments Subject to privacy laws HIPAA GLBA FERPA ND Public Open Records Century Code Using personal e-mail address and equipment for NDSU Business Can be subject to ND Public Open Records Century Code
Workstation Users must have unique login and password Operating system and office software current with latest patches  Anti-virus software and firewall installed, enabled and active Confidential/private data is not accessible or viewable by public Log off computer when done or away from desk Set a password protected screensaver
Workstation Area Confidential/sensitive information not available for public view Protected hard copy documentation stored in locked file cabinet Manipulated hard copy documentation Tidy desk area
Wireless Access Wireless access in the office  Open vs. Secured Access available only to those who need it Wireless access outside of the office Public access Not recommended  Working with confidential private data Use for personal banking Purchasing merchandise online Use NDSU Webmail client to send and receive email – do not send attachments, message body should not contain sensitive information
Laptop Security ,[object Object]
Back up all data, and make use of encryption features when you do so.
Hard drive and external storage is encrypted.
Laptop must be labeled and identified,[object Object]
Phlushing the Phish! What is NDSU doing? What can you do? Recent Spear Phishing Attacks
             Confidential/Private Data Defined and classified in NDUS 1901.2 Examples:  Pesticide Program Master Gardeners 4-H Research What is allowable for use and storage
           Employees & Volunteers Must sign confidentiality agreements Background checks required* Receive formal, documented training  *Above point required if handling electronic financial transactions
           Social Security Numbers Do not use as an identifier on  Files Spread sheets Data bases Correspondence  Any files/documents containing SSN data must be secured and available only to those who have a need to know
       Credit Card Information Do not store Full credit card number (only last four digits) CVV2 number Exp. Date Receipts Only allow last four digits on receipt No CVV2 number No exp. Date Do not accept credit card transactions over email If received over voice mail, delete immediately Must have separation of duties for acceptance of credit cards
More Safeguards Non-disclosure (suppression) Farmers/Ranchers Parents Children Requests for lists of members Health questionnaires (4-H) Date of Birth combined with name Information posted to Web sites
Use & Disposal of Protected Data Encrypt or password protect on electronic devices Back up regularly Allow only those who have a need to know access to data Use only where necessary Dispose of properly
             Personnel  & Volunteer Files Stored in locked cabinet not in public area If request is made to view personnel file Dean and General Counsel to approve request Log request, date, time Viewer must sign log form Only allow what is considered public information to be viewed Purge according to data retention policies Shred with cross cut shredder, burn, using document destruction service
     Suspected Data Breach For computer related security issues contact your supervisor Document reasons you suspect breach of data Do not move, touch, alter equipment or anything related to the breach  Do not attempt to do your own investigation
     NDSU network services E-mail accounts Alias Shared E-mail box space Changing electronic ID Non-employee accounts Affiliate vs. Guest accounts
Alias E-mail Account ,[object Object]
Does not require password
Owner responsible for removing and adding usersSender Alias Recipient Recipient Recipient

Más contenido relacionado

La actualidad más candente

Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacySolix Technologies, Inc
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...Jack Pringle
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records tooBob Larrivee
 
Data protection act
Data protection act Data protection act
Data protection act Iqbal Bocus
 
Legal and ethical aspects in analysing students data
Legal and ethical aspects in analysing students dataLegal and ethical aspects in analysing students data
Legal and ethical aspects in analysing students dataShirisha Jella
 
20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records Managers20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records ManagersJesse Wilkins
 
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw MadisonUsing Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw MadisonNicholas Davis
 
Healthcare Information Security Secure Sensitive Communications Within The ...
Healthcare Information Security   Secure Sensitive Communications Within The ...Healthcare Information Security   Secure Sensitive Communications Within The ...
Healthcare Information Security Secure Sensitive Communications Within The ...Nicholas Davis
 
Wk1 discussion 2
Wk1 discussion 2Wk1 discussion 2
Wk1 discussion 2jodimw
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Security Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens InfoSecurity Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens InfoMegan Bell
 

La actualidad más candente (17)

Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacy
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records too
 
ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR
 
MIS ppt 1
MIS ppt 1MIS ppt 1
MIS ppt 1
 
Data protection act
Data protection act Data protection act
Data protection act
 
Chapter1
Chapter1Chapter1
Chapter1
 
Legal and ethical aspects in analysing students data
Legal and ethical aspects in analysing students dataLegal and ethical aspects in analysing students data
Legal and ethical aspects in analysing students data
 
20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records Managers20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records Managers
 
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw MadisonUsing Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
 
Threats
ThreatsThreats
Threats
 
Healthcare Information Security Secure Sensitive Communications Within The ...
Healthcare Information Security   Secure Sensitive Communications Within The ...Healthcare Information Security   Secure Sensitive Communications Within The ...
Healthcare Information Security Secure Sensitive Communications Within The ...
 
Wk1 discussion 2
Wk1 discussion 2Wk1 discussion 2
Wk1 discussion 2
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
IoT
IoTIoT
IoT
 
Security Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens InfoSecurity Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens Info
 

Destacado

I Love How North Dakota is Growing (as long as nothing changes)
I Love How North Dakota is Growing (as long as nothing changes)I Love How North Dakota is Growing (as long as nothing changes)
I Love How North Dakota is Growing (as long as nothing changes)Bruce Sundeen
 
Presentación sobre Medina Azahara
Presentación sobre Medina AzaharaPresentación sobre Medina Azahara
Presentación sobre Medina AzaharaIES Villarrubia
 
Photography Presentation
Photography PresentationPhotography Presentation
Photography Presentationburrendav
 
Legislative Advocacy: New Players New Rules, New Realities
Legislative Advocacy: New Players New Rules, New RealitiesLegislative Advocacy: New Players New Rules, New Realities
Legislative Advocacy: New Players New Rules, New RealitiesBruce Sundeen
 
Responsive web design - tips & tricks
Responsive web design - tips & tricksResponsive web design - tips & tricks
Responsive web design - tips & tricksRavi Bhadauria
 
Typography and Colors for GUI Designers
Typography and Colors for GUI DesignersTypography and Colors for GUI Designers
Typography and Colors for GUI DesignersRavi Bhadauria
 

Destacado (7)

Photography Tips
Photography TipsPhotography Tips
Photography Tips
 
I Love How North Dakota is Growing (as long as nothing changes)
I Love How North Dakota is Growing (as long as nothing changes)I Love How North Dakota is Growing (as long as nothing changes)
I Love How North Dakota is Growing (as long as nothing changes)
 
Presentación sobre Medina Azahara
Presentación sobre Medina AzaharaPresentación sobre Medina Azahara
Presentación sobre Medina Azahara
 
Photography Presentation
Photography PresentationPhotography Presentation
Photography Presentation
 
Legislative Advocacy: New Players New Rules, New Realities
Legislative Advocacy: New Players New Rules, New RealitiesLegislative Advocacy: New Players New Rules, New Realities
Legislative Advocacy: New Players New Rules, New Realities
 
Responsive web design - tips & tricks
Responsive web design - tips & tricksResponsive web design - tips & tricks
Responsive web design - tips & tricks
 
Typography and Colors for GUI Designers
Typography and Colors for GUI DesignersTypography and Colors for GUI Designers
Typography and Colors for GUI Designers
 

Similar a Managing It Security

5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLEJonathan Ezor
 
Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security cschumley
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerZitaAdlTrk
 
Carol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practiceCarol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practicecschlein
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachJon Gatrell
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxmusicalworld14
 
Training for managers and supervisors presentation
Training for managers and supervisors presentationTraining for managers and supervisors presentation
Training for managers and supervisors presentationbrentcarey
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)Wissam Abdel Baki
 
Recycling eDiscovery Best Practices for Data Breach Incident Response
Recycling eDiscovery Best Practices for Data Breach Incident ResponseRecycling eDiscovery Best Practices for Data Breach Incident Response
Recycling eDiscovery Best Practices for Data Breach Incident ResponseIpro Tech
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information SecurityKen Holmes
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Security environment
Security environmentSecurity environment
Security environmentJay Choudhary
 
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference ArchitectureECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference ArchitectureEuropean Collaboration Summit
 
User & Mobile Centric Identity
User & Mobile Centric IdentityUser & Mobile Centric Identity
User & Mobile Centric Identitywegdam
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Vijay Dalmia
 
IT Policy - Need of the Hour
IT Policy - Need of the HourIT Policy - Need of the Hour
IT Policy - Need of the HourVijay Dalmia
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Securitysatyakam_biswas
 

Similar a Managing It Security (20)

5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE
 
Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security
 
Ppt Employee Pres
Ppt Employee PresPpt Employee Pres
Ppt Employee Pres
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
Carol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practiceCarol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practice
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
 
Training for managers and supervisors presentation
Training for managers and supervisors presentationTraining for managers and supervisors presentation
Training for managers and supervisors presentation
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)
 
Recycling eDiscovery Best Practices for Data Breach Incident Response
Recycling eDiscovery Best Practices for Data Breach Incident ResponseRecycling eDiscovery Best Practices for Data Breach Incident Response
Recycling eDiscovery Best Practices for Data Breach Incident Response
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Security environment
Security environmentSecurity environment
Security environment
 
Unit 3
Unit 3Unit 3
Unit 3
 
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference ArchitectureECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
 
Cybersmart
CybersmartCybersmart
Cybersmart
 
User & Mobile Centric Identity
User & Mobile Centric IdentityUser & Mobile Centric Identity
User & Mobile Centric Identity
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour
 
IT Policy - Need of the Hour
IT Policy - Need of the HourIT Policy - Need of the Hour
IT Policy - Need of the Hour
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Security
 

Más de Bruce Sundeen

Making the Best of Economic Uncertainties
Making the Best of Economic UncertaintiesMaking the Best of Economic Uncertainties
Making the Best of Economic UncertaintiesBruce Sundeen
 
Research Update 2009
Research Update 2009Research Update 2009
Research Update 2009Bruce Sundeen
 
Taking Goodto Great10 12
Taking Goodto Great10 12Taking Goodto Great10 12
Taking Goodto Great10 12Bruce Sundeen
 
Legislative Advocacy National Fcs
Legislative Advocacy National FcsLegislative Advocacy National Fcs
Legislative Advocacy National FcsBruce Sundeen
 

Más de Bruce Sundeen (6)

Risk Communication
Risk CommunicationRisk Communication
Risk Communication
 
Making the Best of Economic Uncertainties
Making the Best of Economic UncertaintiesMaking the Best of Economic Uncertainties
Making the Best of Economic Uncertainties
 
Research Update 2009
Research Update 2009Research Update 2009
Research Update 2009
 
Taking Goodto Great10 12
Taking Goodto Great10 12Taking Goodto Great10 12
Taking Goodto Great10 12
 
Extension
ExtensionExtension
Extension
 
Legislative Advocacy National Fcs
Legislative Advocacy National FcsLegislative Advocacy National Fcs
Legislative Advocacy National Fcs
 

Último

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 

Último (20)

FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 

Managing It Security

  • 1. Managing IT Security for Extension and Outreach Offices Theresa Semmens NDSU Chief IT Security Officer October, 2009
  • 2. Presentation Outline Security Guidelines Email Workstation Wireless External Mobile Device Security Protection of Confidential and Private Data Online Financial Transactions Those *!@&$ NDSU network services Dual Support with the ND Association of Counties
  • 3. NDSU E-mail What is secure Encrypted User name and password Email messages and attachments Subject to privacy laws HIPAA GLBA FERPA ND Public Open Records Century Code Using personal e-mail address and equipment for NDSU Business Can be subject to ND Public Open Records Century Code
  • 4. Workstation Users must have unique login and password Operating system and office software current with latest patches Anti-virus software and firewall installed, enabled and active Confidential/private data is not accessible or viewable by public Log off computer when done or away from desk Set a password protected screensaver
  • 5. Workstation Area Confidential/sensitive information not available for public view Protected hard copy documentation stored in locked file cabinet Manipulated hard copy documentation Tidy desk area
  • 6. Wireless Access Wireless access in the office Open vs. Secured Access available only to those who need it Wireless access outside of the office Public access Not recommended Working with confidential private data Use for personal banking Purchasing merchandise online Use NDSU Webmail client to send and receive email – do not send attachments, message body should not contain sensitive information
  • 7.
  • 8. Back up all data, and make use of encryption features when you do so.
  • 9. Hard drive and external storage is encrypted.
  • 10.
  • 11. Phlushing the Phish! What is NDSU doing? What can you do? Recent Spear Phishing Attacks
  • 12. Confidential/Private Data Defined and classified in NDUS 1901.2 Examples: Pesticide Program Master Gardeners 4-H Research What is allowable for use and storage
  • 13. Employees & Volunteers Must sign confidentiality agreements Background checks required* Receive formal, documented training *Above point required if handling electronic financial transactions
  • 14. Social Security Numbers Do not use as an identifier on Files Spread sheets Data bases Correspondence Any files/documents containing SSN data must be secured and available only to those who have a need to know
  • 15. Credit Card Information Do not store Full credit card number (only last four digits) CVV2 number Exp. Date Receipts Only allow last four digits on receipt No CVV2 number No exp. Date Do not accept credit card transactions over email If received over voice mail, delete immediately Must have separation of duties for acceptance of credit cards
  • 16. More Safeguards Non-disclosure (suppression) Farmers/Ranchers Parents Children Requests for lists of members Health questionnaires (4-H) Date of Birth combined with name Information posted to Web sites
  • 17. Use & Disposal of Protected Data Encrypt or password protect on electronic devices Back up regularly Allow only those who have a need to know access to data Use only where necessary Dispose of properly
  • 18. Personnel & Volunteer Files Stored in locked cabinet not in public area If request is made to view personnel file Dean and General Counsel to approve request Log request, date, time Viewer must sign log form Only allow what is considered public information to be viewed Purge according to data retention policies Shred with cross cut shredder, burn, using document destruction service
  • 19. Suspected Data Breach For computer related security issues contact your supervisor Document reasons you suspect breach of data Do not move, touch, alter equipment or anything related to the breach Do not attempt to do your own investigation
  • 20. NDSU network services E-mail accounts Alias Shared E-mail box space Changing electronic ID Non-employee accounts Affiliate vs. Guest accounts
  • 21.
  • 22. Does not require password
  • 23. Owner responsible for removing and adding usersSender Alias Recipient Recipient Recipient
  • 24.
  • 26. Owner required to change password when users leave or are added to groupSender Shared Recipient Recipient Recipient
  • 27. Electronic ID Official Format = FirstName.LastName Full-time employees and Students can change EID at http://enroll.nodak.edu Non-employees/students must request change Change subject to previous ownership of “name space.” Name change due to marriage/divorce – must go through HR with proper documentation Employees have 500 MB e-mail box. Request to increase must be sent through Helpdesk.
  • 28. Affiliate vs. Guest Accounts Services available: desktop_auth, Blackboard, Library, Wireless Must be “sponsored” by department Affiliate accounts for periods longer than one week Guest accounts for periods less than one week E-mail requires completion of Non-employee ID form
  • 29. Managing IT Security for Extension and Outreach Offices Theresa Semmens NDSU Chief IT Security Officer October, 2009