SlideShare una empresa de Scribd logo
1 de 8
An ITS Security Training Module Version Oct 2009 v3 CLICK “FULL” TO VIEW SLIDE IN FULL SCREEN.
Many types of Sensitive Information are stored on your computer.  It is important to protect it from hackers who wish to cause harm. Sensitive Information
Sensitive Information & Your UNC Job Section: Sensitive Information Access Sensitive Information only when required to complete your job.   Keep your passwords secret! Comply with the University policies, such as the Acceptable Use Policy. Avoid storing Sensitive Information on mobile and portable devices. Report promptly the loss or misuse of University information to the campus IT Help Desk at (919.962.HELP),  your supervisor, or the ITS Information Security Office.
Sensitive Information Examples Section: Sensitive Information Personal information Social Security numbers Protected health information medical records  Student education records   grades or honor code proceedings Customer information  bank account information Card holder data  credit card numbers Confidential personnel information disciplinary information Some research data  data involving patents It is every employee’s responsibility to  protect Sensitive Information and keep it confidential.
Regulations Related to Sensitive Information Section: Sensitive Information Sensitive Information is subject to a number of state and federal regulations, including: FERPA (Family Educational Rights and Privacy Act) Covers educational records, including student grade information HIPAA(Health Insurance Portability and Accountability Act) Covers medical information, such as patient records
Regulations Related to Sensitive Information Section: Sensitive Information Sensitive Information is subject to a number of state and federal regulations, including: State Personnel Act   Covers information maintained in personnel files, which, with very limited exceptions, is considered confidential State Identity Theft Prevention Act  Covers information, such as Social Security numbers or the name of a person in combination with a checking account number, often sought by criminals intending to commit identity theft.
Learning Point # 2 A friend asks me to post hisresume on my Web site. The resume contains his full Social Security number. Since he gave me his permission to post the resume, the Social Security number is not considered Sensitive Information. Right? Section: Sensitive Information Wrong! In fact, Social Security numbers are considered Sensitive Information under the North Carolina Identity Theft Protection Act and should only be disclosed if absolutely necessary. Social Security numbers should never be posted on Web sites.
Learning Point #3 Section: Sensitive Information My supervisor has asked me to shred some old files. As I am going through the files, I notice grade information belonging to my neighbor’s son. I can peek at the file since my neighbor already has informed me that her son is an Honors student. Right? Wrong! In fact, student grades are considered Sensitive Information. Any Sensitive Information should only be accessed if there is a business need for such access. Accessing Sensitive Information without a business need is a violation of University policy.

Más contenido relacionado

La actualidad más candente

Computer related risks presentation
Computer related risks presentationComputer related risks presentation
Computer related risks presentation
leodegras
 
Computer related risks presentation
Computer related risks presentationComputer related risks presentation
Computer related risks presentation
leodegras
 
Fire eye spearphishing
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishing
Zeno Idzerda
 
Data security problems
Data security problemsData security problems
Data security problems
Mathew
 
Spear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaSpear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishna
Raghunath G
 

La actualidad más candente (20)

Idenity Theft
Idenity TheftIdenity Theft
Idenity Theft
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Anatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackAnatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing Attack
 
Spear phishing attacks
Spear phishing attacksSpear phishing attacks
Spear phishing attacks
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Phishing
PhishingPhishing
Phishing
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Computer related risks presentation
Computer related risks presentationComputer related risks presentation
Computer related risks presentation
 
Computer related risks presentation
Computer related risks presentationComputer related risks presentation
Computer related risks presentation
 
Fire eye spearphishing
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishing
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attack
 
Phishing work
Phishing workPhishing work
Phishing work
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
Data security problems
Data security problemsData security problems
Data security problems
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
 
Spear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaSpear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishna
 
Phishing demo
Phishing demoPhishing demo
Phishing demo
 

Destacado (6)

Security Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless ConnectionsSecurity Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless Connections
 
Security Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect EquipmentSecurity Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect Equipment
 
Security Awareness 9 10 09 V4 Workplace Policies
Security Awareness 9 10 09 V4 Workplace PoliciesSecurity Awareness 9 10 09 V4 Workplace Policies
Security Awareness 9 10 09 V4 Workplace Policies
 
Security Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got MailSecurity Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got Mail
 
Security Awareness 9 10 09 V4 Appropriate Disposal
Security Awareness 9 10 09  V4  Appropriate  DisposalSecurity Awareness 9 10 09  V4  Appropriate  Disposal
Security Awareness 9 10 09 V4 Appropriate Disposal
 
Security Awareness 9-10-09 v5 Appropriate Disposal
Security Awareness 9-10-09 v5 Appropriate DisposalSecurity Awareness 9-10-09 v5 Appropriate Disposal
Security Awareness 9-10-09 v5 Appropriate Disposal
 

Similar a Security Awareness 9-10-09 v5 Sensitive Information

George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
Don Grauel
 
C:\Fakepath\Secprimodule
C:\Fakepath\SecprimoduleC:\Fakepath\Secprimodule
C:\Fakepath\Secprimodule
Brenda Kershaw
 

Similar a Security Awareness 9-10-09 v5 Sensitive Information (20)

Recycling eDiscovery Best Practices for Data Breach Incident Response
Recycling eDiscovery Best Practices for Data Breach Incident ResponseRecycling eDiscovery Best Practices for Data Breach Incident Response
Recycling eDiscovery Best Practices for Data Breach Incident Response
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
19012021039_Assignment-FCL.dcx
19012021039_Assignment-FCL.dcx19012021039_Assignment-FCL.dcx
19012021039_Assignment-FCL.dcx
 
Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Guarding Vanderbilt information
Guarding Vanderbilt informationGuarding Vanderbilt information
Guarding Vanderbilt information
 
Protecting Vanderbilt Information
Protecting Vanderbilt InformationProtecting Vanderbilt Information
Protecting Vanderbilt Information
 
Identity theft
Identity theftIdentity theft
Identity theft
 
IS Know How - Third Sector Cyber Security Survey 2015 Infographic
IS Know How - Third Sector Cyber Security Survey 2015 InfographicIS Know How - Third Sector Cyber Security Survey 2015 Infographic
IS Know How - Third Sector Cyber Security Survey 2015 Infographic
 
Csd6059
Csd6059Csd6059
Csd6059
 
C:\Fakepath\Secprimodule
C:\Fakepath\SecprimoduleC:\Fakepath\Secprimodule
C:\Fakepath\Secprimodule
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
 
Cy bsec do_d2015
Cy bsec do_d2015Cy bsec do_d2015
Cy bsec do_d2015
 
FTC Safeguard
FTC SafeguardFTC Safeguard
FTC Safeguard
 
What I found in my data: True data security stories
What I found in my data: True data security storiesWhat I found in my data: True data security stories
What I found in my data: True data security stories
 
20230906-Information-Security-and-Data-Priv.pdf
20230906-Information-Security-and-Data-Priv.pdf20230906-Information-Security-and-Data-Priv.pdf
20230906-Information-Security-and-Data-Priv.pdf
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Security Awareness 9-10-09 v5 Sensitive Information

  • 1. An ITS Security Training Module Version Oct 2009 v3 CLICK “FULL” TO VIEW SLIDE IN FULL SCREEN.
  • 2. Many types of Sensitive Information are stored on your computer. It is important to protect it from hackers who wish to cause harm. Sensitive Information
  • 3. Sensitive Information & Your UNC Job Section: Sensitive Information Access Sensitive Information only when required to complete your job. Keep your passwords secret! Comply with the University policies, such as the Acceptable Use Policy. Avoid storing Sensitive Information on mobile and portable devices. Report promptly the loss or misuse of University information to the campus IT Help Desk at (919.962.HELP), your supervisor, or the ITS Information Security Office.
  • 4. Sensitive Information Examples Section: Sensitive Information Personal information Social Security numbers Protected health information medical records Student education records grades or honor code proceedings Customer information bank account information Card holder data credit card numbers Confidential personnel information disciplinary information Some research data data involving patents It is every employee’s responsibility to protect Sensitive Information and keep it confidential.
  • 5. Regulations Related to Sensitive Information Section: Sensitive Information Sensitive Information is subject to a number of state and federal regulations, including: FERPA (Family Educational Rights and Privacy Act) Covers educational records, including student grade information HIPAA(Health Insurance Portability and Accountability Act) Covers medical information, such as patient records
  • 6. Regulations Related to Sensitive Information Section: Sensitive Information Sensitive Information is subject to a number of state and federal regulations, including: State Personnel Act Covers information maintained in personnel files, which, with very limited exceptions, is considered confidential State Identity Theft Prevention Act Covers information, such as Social Security numbers or the name of a person in combination with a checking account number, often sought by criminals intending to commit identity theft.
  • 7. Learning Point # 2 A friend asks me to post hisresume on my Web site. The resume contains his full Social Security number. Since he gave me his permission to post the resume, the Social Security number is not considered Sensitive Information. Right? Section: Sensitive Information Wrong! In fact, Social Security numbers are considered Sensitive Information under the North Carolina Identity Theft Protection Act and should only be disclosed if absolutely necessary. Social Security numbers should never be posted on Web sites.
  • 8. Learning Point #3 Section: Sensitive Information My supervisor has asked me to shred some old files. As I am going through the files, I notice grade information belonging to my neighbor’s son. I can peek at the file since my neighbor already has informed me that her son is an Honors student. Right? Wrong! In fact, student grades are considered Sensitive Information. Any Sensitive Information should only be accessed if there is a business need for such access. Accessing Sensitive Information without a business need is a violation of University policy.