SlideShare a Scribd company logo
1 of 14
2022
Data Security and Privacy Training
Agenda
● Why security compliance is necessary?
● What data needs to be secured?
● Our commitment to data security & privacy
● Security Tips
● Privacy Tips
● Incident Guidance
● Privacy
Purpose and Goal
● This training is a required element our information security program
● The goal of this training is to set an information security baseline for all
employees, regardless of role and to familiarize employees of data
security and information privacy best practices
● Refer to our Information Security Policy for details
Why data security?
● Customers are asking for this!
● Supports compliance with laws and regulations
● We are entrusted with confidential client information (and our own!)
● Win key client projects by following best practice data security standards
Data Classification
Data Classification tell us how to store and treat the data.
● PUBLIC - Anyone can see or find this data
● CONFIDENTIAL - Business data not meant for public consumption;
○ Could cause the Company harm if shared
○ Ex: Customer contracts, financial data, pre-release product specs
● SENSITIVE - Consumer user personal data, client contract details;
○ Could cause our clients/users & our Company harm if shared
○ Ex: Study Participant personal data, HR data
Security Tips
● Use good judgement with private use of Company equipment
● Use caution when opening attachments or strange emails
● Nothing illegal or harassing; no spamming
● Never share one customer’s information with another customer
Password Tips
● Long passwords; consider a passphrase Jur@ssicP@rk!1
● Don’t share your password or write it down
● Consider using a password manager
● When available, enable multi-factor authentication
● Power down your laptop periodically and maintain recent software
updates
Security Tips
● Enable your password lock when you are away from your machine
● Do not leave your laptop or device unattended when out of the office
● Be paranoid: download only from trusted sources
● Be wary when using public wifi outside of the office
● Never use personal email accounts (e.g. hotmail, gmail, etc.) when
exchanging Confidential or Sensitive information
Incident Defined
● Problem: An issue that can be easily remedied
Examples: broken mouse, missing power cord, trouble loading new
software
● Incident: When something is not working as expected or there is a
deviation from the normal way something is expected to work.
Incident Response procedures kick in
● Breach: Sensitive personal data OR highly confidential customer data is
compromised
Quiz- Problem, Incident, or
Breach?
● What do you think? Are these “incidents” or “problems”?
● Your laptop was just stolen!
● MS Excel keeps crashing
● You lost your power cord
● There is a strange software loading message on your computer
● A participant’s data was accidentally shared with another participant
(or client)
Incident ‘Data’
The Data Loss Incident Report Template can be found in our “All
employee shared drive”
Document the following:
● How did you notice the event?
● What systems or hardware are affected?
● Is the information Confidential or sensitive?
● What did you do?
Privacy Basics
Privacy is a concept specific to individuals
● Personal space
● Right to be left alone
● Secrecy
● Control over personal data
A “data subject” is another word for an individual or person
Personal identifying information (or PII) refers to any bit of
data/information about a person that alone or in combination with
other data can identify that person.
PII Handling
Questions
?

More Related Content

Similar to Data privacy and data classification

CISSP Week 12
CISSP Week 12CISSP Week 12
CISSP Week 12
jemtallon
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
Online Business
 

Similar to Data privacy and data classification (20)

BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)
 
apidays LIVE Paris 2021 - How password managers are built for Privacy and Sec...
apidays LIVE Paris 2021 - How password managers are built for Privacy and Sec...apidays LIVE Paris 2021 - How password managers are built for Privacy and Sec...
apidays LIVE Paris 2021 - How password managers are built for Privacy and Sec...
 
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
 
Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)
 
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
TLabs - deutsche telekom
TLabs -  deutsche telekomTLabs -  deutsche telekom
TLabs - deutsche telekom
 
Secure Software Design for Data Privacy
Secure Software Design for Data PrivacySecure Software Design for Data Privacy
Secure Software Design for Data Privacy
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
CISSP Week 12
CISSP Week 12CISSP Week 12
CISSP Week 12
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Data security in the age of GDPR – most common data security problems
Data security in the age of GDPR – most common data security problemsData security in the age of GDPR – most common data security problems
Data security in the age of GDPR – most common data security problems
 
Data Security for MSME
Data Security for MSMEData Security for MSME
Data Security for MSME
 
Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
 
Pcs academy october_2020_security
Pcs academy october_2020_securityPcs academy october_2020_security
Pcs academy october_2020_security
 
Pcs security waves
Pcs security wavesPcs security waves
Pcs security waves
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

Data privacy and data classification

  • 1. 2022 Data Security and Privacy Training
  • 2. Agenda ● Why security compliance is necessary? ● What data needs to be secured? ● Our commitment to data security & privacy ● Security Tips ● Privacy Tips ● Incident Guidance ● Privacy
  • 3. Purpose and Goal ● This training is a required element our information security program ● The goal of this training is to set an information security baseline for all employees, regardless of role and to familiarize employees of data security and information privacy best practices ● Refer to our Information Security Policy for details
  • 4. Why data security? ● Customers are asking for this! ● Supports compliance with laws and regulations ● We are entrusted with confidential client information (and our own!) ● Win key client projects by following best practice data security standards
  • 5. Data Classification Data Classification tell us how to store and treat the data. ● PUBLIC - Anyone can see or find this data ● CONFIDENTIAL - Business data not meant for public consumption; ○ Could cause the Company harm if shared ○ Ex: Customer contracts, financial data, pre-release product specs ● SENSITIVE - Consumer user personal data, client contract details; ○ Could cause our clients/users & our Company harm if shared ○ Ex: Study Participant personal data, HR data
  • 6. Security Tips ● Use good judgement with private use of Company equipment ● Use caution when opening attachments or strange emails ● Nothing illegal or harassing; no spamming ● Never share one customer’s information with another customer
  • 7. Password Tips ● Long passwords; consider a passphrase Jur@ssicP@rk!1 ● Don’t share your password or write it down ● Consider using a password manager ● When available, enable multi-factor authentication ● Power down your laptop periodically and maintain recent software updates
  • 8. Security Tips ● Enable your password lock when you are away from your machine ● Do not leave your laptop or device unattended when out of the office ● Be paranoid: download only from trusted sources ● Be wary when using public wifi outside of the office ● Never use personal email accounts (e.g. hotmail, gmail, etc.) when exchanging Confidential or Sensitive information
  • 9. Incident Defined ● Problem: An issue that can be easily remedied Examples: broken mouse, missing power cord, trouble loading new software ● Incident: When something is not working as expected or there is a deviation from the normal way something is expected to work. Incident Response procedures kick in ● Breach: Sensitive personal data OR highly confidential customer data is compromised
  • 10. Quiz- Problem, Incident, or Breach? ● What do you think? Are these “incidents” or “problems”? ● Your laptop was just stolen! ● MS Excel keeps crashing ● You lost your power cord ● There is a strange software loading message on your computer ● A participant’s data was accidentally shared with another participant (or client)
  • 11. Incident ‘Data’ The Data Loss Incident Report Template can be found in our “All employee shared drive” Document the following: ● How did you notice the event? ● What systems or hardware are affected? ● Is the information Confidential or sensitive? ● What did you do?
  • 12. Privacy Basics Privacy is a concept specific to individuals ● Personal space ● Right to be left alone ● Secrecy ● Control over personal data A “data subject” is another word for an individual or person Personal identifying information (or PII) refers to any bit of data/information about a person that alone or in combination with other data can identify that person.