SlideShare a Scribd company logo
1 of 26
Student Data Security
2014 – Year of the breach!
Over a billion personal data records were compromised in 2014 - NBCNEWS.com
Largest Higher Education Breaches of 2014
University of Maryland - 300k record
North Dakota University – 300k records
Butler University – 200k records
Indiana University – 146k records
Arkansas State University – 50k records
All of these were bigger than the Sony breach!
- Huffington Post
Others Costs
• Loss of student trust
• Damage to reputation
• Loss of staff productivity
• Legal action
• Additional audit requirements
• ??
Financial Costs
Areas of Focus
What is the Weakest Link in Your
Security?
Key Awareness Topics
Password Management
Mobile device security
WiFi Security
Password Management
Unique passwords for services – Never use your email account
Use combination of words, numbers, symbols using upper- and lower- case letters
Don’t use easily guessed passwords (e.g. password, user)
Don’t use words found in dictionary or sequences
Complexity is nice but length is more import
Never keep a list of passwords around
Use two step or two factor authentication whenever possible
-krebsonsecurity.com
Mobile Device Security
Use pin, password or pattern lock your phone
Enable data encryption features
Download apps only from trusted stores
o Install an anti-malware program (e.g. Lookout)
o Install anti-theft software
Don’t root or jailbreak your phone
Keep your operating system and apps updated
Log out of sites after you make a payment
Switch off Wi-Fi and Bluetooth when not in use
- Techradar.com
Public WiFi Use
Know that you are never secure!
Use built in tools
 Enable firewall
 Block all incoming traffic
 Disable file sharing
Look for Padlock
Confirm network name with your location
Use common sense
- CNET.com
Secure Processes
Don’t leave sensitive information lying around unprotected,
including on printers, fax machines, or copiers
Secure area, files and portable equipment before leaving them
unattended (ask IT to automatically lock unattended computers)
Shred sensitive paper records before disposing of them
Don’t use email to transmit sensitive data including scanned
document attachments
Don’t send paper mail that includes SSN, financial account
information, drivers license etc
Insure that all staff have their own logins and accounts (No sharing)
Email is not secure!
“Email was not designed with any privacy or security in mind”
- Geoff Duncan, Digital Trends
IT Security Best Practices
Encrypt your data
Use digital certificate to sign all of your sites
Implement a removable media policy
Protect school websites
Network endpoint security
Stay current with patches and upgrades
Establish policy of no PII data on laptops or mobile devices
Vendor Checklist
 How is my data transmitted securely?
 What algorithms are used to store my data?
 How will my data be stored and protected?
 How are the various levels of access granted and controlled?
 Who at the vendor has access to my data? Is there background screening?
How are users authenticated? What is the password management functionality
What type of physical security is provided for your data center?
 How are the various levels of access granted and controlled?
 What security audits and/process audits do you comply with?
 Is there explicit contract language for who owns data and how data can be used?
Alphabet Soup
Certification Purpose
SSAE 16, SOCC1 and 2 Auditing standard to ensure appropriate controls for your hosting provider.
Certification of controls for privacy and security.
TRUSTe Certification Privacy protection certification
PCI DSS Certifies data security of credit card payment processing
FedRAMP Government program that provides a standard approach to security
assessment, authorization and monitoring of cloud products and services
FIPS 140-2 Federal Information Processing Standard for accrediting data encryption
standards
ISO 27001 Audit and risk assessment framework for information security management
Vendors who are serious about security will certify on multiple of these based on the service.
Responding to a Breach
Have a Plan – Key Elements
First 24 Hour Checklist
Notification Requirements
Other Services
Elements of a Good Response Plan
Define a response team with clear roles and responsibilities
 Executive Leader, IT, Public Relations, Student Services, Legal, Law Enforcement Liaison
 Assign somebody to maintain a contact list quarterly basis
Have a documented plan and procedure for investigation, notification, support, legal review
Plan for increased call volume to a call center or other support help line
Provide for FAQ and support materials on Institution Website and/or student portals
Have policy for cases that warrant complimentary identity protection and credit monitoring
services
Pre-selection of a data forensic vendor to assist in breach response
Pre-selection and negotiation with a Breach Resolution Vendor who can guide you through
process of planning and support response
First 24 Hour Checklist
 Record dates and times – Discovery, Response start
Alert Response Team – Internal and external resources as identified in your plan
Stop additional data loss – Take care to maintain forensic evidence
Secure premise or equipment to preserve evidence
Document Incident Report – Key facts, who discovered and when, scope of breach. Interview individuals who
found breach
Bring in forensics team
Notify law enforcement
Assess priorities and risks
Set response plan in action for notification, PR, call center and execution of support service (Credit Monitoring
- Experian Data Breach Response Guide
Notification Requirements
California Civil Code s. 1798.29 and California Civil Code s. 1798.82
DOE Privacy Technical Assistance Center
 Consider notifying Family Policy Compliance Office (FPCO) about the breach. (FERPA does not require that you
notify FPCO of the breach; however, the U.S. Department of Education considers it a best practice.
 FPCO can assist educational agencies and institutions by helping to determine the potential for harm resulting
from the release of the information
California Office of Privacy Protection
 Notify Attorney General for breach > 500
 Notify Credit Agencies if breach > 10,000
-http://oag.ca.gov
Notification to Students
 Speed, Openness and transparency are the keys
 Notify individuals within 10 business days of confirming the breach
 The date of the notice. If the notice was delayed as the result of a law enforcement investigation, say so.
 A general description of the breach incident.
 The specific types of personal information that were involved.
 The name and contact information
 The toll-free telephone numbers and addresses of the major credit reporting agencies, but only in a breach
involving Social Security numbers or driver’s license or California ID numbers.
 What you have done to protect the individual’s personal information from further unauthorized acquisition.
 What your organization will do to assist individuals, including providing your toll free contact telephone number for
more information and assistance.
 Information on what individuals can do to protect themselves from identity theft, as appropriate for the specific
type of personal information involved.
- http://oag.ca.gov/sites/all/files/agweb/pdfs/privacy/recom_breach_prac.pdf
Questions
Our cloud-based products help financial aid departments save time, decrease costs,
lower security risk and improve the student experience.
campuslogic.com
Gilbert, AZ
Chris Chumley, COO
chris.chumley@campuslogic.com
Follow on Twitter @cschumley

More Related Content

What's hot

Security and control in mis
Security and control in misSecurity and control in mis
Security and control in misGurjit
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1NetWatcher
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challengesVineet Dubey
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataStephen Cobb
 
The insider versus external threat
The insider versus external threatThe insider versus external threat
The insider versus external threatzhihaochen
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Information Security
Information SecurityInformation Security
Information Securitysteffiann88
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threadsLeena Reddy
 
Safety And Security Of Data Student Work
Safety And Security Of Data Student WorkSafety And Security Of Data Student Work
Safety And Security Of Data Student WorkWynthorpe
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to securityDhani Ahmad
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info SystemsHemant Nagwekar
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMANAND MURALI
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasuresKAMRAN KHALID
 
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...Armstrong Teasdale
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Asad Zaman
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01ITNet
 

What's hot (19)

Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
 
The insider versus external threat
The insider versus external threatThe insider versus external threat
The insider versus external threat
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Information Security
Information SecurityInformation Security
Information Security
 
Byod
ByodByod
Byod
 
Information security
Information securityInformation security
Information security
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threads
 
Safety And Security Of Data Student Work
Safety And Security Of Data Student WorkSafety And Security Of Data Student Work
Safety And Security Of Data Student Work
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info Systems
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasures
 
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01
 

Viewers also liked

Viewers also liked (6)

Pantun
PantunPantun
Pantun
 
Ako zbaliť fanúšika?
Ako zbaliť fanúšika?Ako zbaliť fanúšika?
Ako zbaliť fanúšika?
 
Pengaruh islam terhadap
Pengaruh islam terhadapPengaruh islam terhadap
Pengaruh islam terhadap
 
Genre drama
Genre dramaGenre drama
Genre drama
 
bahasa Indonesia kelas XII
bahasa Indonesia kelas XII bahasa Indonesia kelas XII
bahasa Indonesia kelas XII
 
Efi By Astra Internasional
Efi By Astra InternasionalEfi By Astra Internasional
Efi By Astra Internasional
 

Similar to Don't Get Stung - Student Data Security

Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgePerficient, Inc.
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) DataDATAVERSITY
 
Data Protection: We\'re In This Together
Data Protection: We\'re In This TogetherData Protection: We\'re In This Together
Data Protection: We\'re In This Togethermyeaton
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security ProgramRaymond Cunningham
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offeringeeaches
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachJon Gatrell
 
3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare OrganizationsAvePoint
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)stevemeltzer
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextBrian Pichman
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Don Grauel
 
M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06gbroadbent67
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Lawguest8b10a3
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 

Similar to Don't Get Stung - Student Data Security (20)

Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 
Data Protection: We\'re In This Together
Data Protection: We\'re In This TogetherData Protection: We\'re In This Together
Data Protection: We\'re In This Together
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 
3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take next
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Law
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 

Recently uploaded

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Recently uploaded (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 

Don't Get Stung - Student Data Security

  • 2. 2014 – Year of the breach! Over a billion personal data records were compromised in 2014 - NBCNEWS.com
  • 3. Largest Higher Education Breaches of 2014 University of Maryland - 300k record North Dakota University – 300k records Butler University – 200k records Indiana University – 146k records Arkansas State University – 50k records All of these were bigger than the Sony breach! - Huffington Post
  • 4.
  • 5.
  • 6. Others Costs • Loss of student trust • Damage to reputation • Loss of staff productivity • Legal action • Additional audit requirements • ?? Financial Costs
  • 7.
  • 8.
  • 10. What is the Weakest Link in Your Security?
  • 11. Key Awareness Topics Password Management Mobile device security WiFi Security
  • 12. Password Management Unique passwords for services – Never use your email account Use combination of words, numbers, symbols using upper- and lower- case letters Don’t use easily guessed passwords (e.g. password, user) Don’t use words found in dictionary or sequences Complexity is nice but length is more import Never keep a list of passwords around Use two step or two factor authentication whenever possible -krebsonsecurity.com
  • 13. Mobile Device Security Use pin, password or pattern lock your phone Enable data encryption features Download apps only from trusted stores o Install an anti-malware program (e.g. Lookout) o Install anti-theft software Don’t root or jailbreak your phone Keep your operating system and apps updated Log out of sites after you make a payment Switch off Wi-Fi and Bluetooth when not in use - Techradar.com
  • 14. Public WiFi Use Know that you are never secure! Use built in tools  Enable firewall  Block all incoming traffic  Disable file sharing Look for Padlock Confirm network name with your location Use common sense - CNET.com
  • 15. Secure Processes Don’t leave sensitive information lying around unprotected, including on printers, fax machines, or copiers Secure area, files and portable equipment before leaving them unattended (ask IT to automatically lock unattended computers) Shred sensitive paper records before disposing of them Don’t use email to transmit sensitive data including scanned document attachments Don’t send paper mail that includes SSN, financial account information, drivers license etc Insure that all staff have their own logins and accounts (No sharing)
  • 16. Email is not secure! “Email was not designed with any privacy or security in mind” - Geoff Duncan, Digital Trends
  • 17. IT Security Best Practices Encrypt your data Use digital certificate to sign all of your sites Implement a removable media policy Protect school websites Network endpoint security Stay current with patches and upgrades Establish policy of no PII data on laptops or mobile devices
  • 18. Vendor Checklist  How is my data transmitted securely?  What algorithms are used to store my data?  How will my data be stored and protected?  How are the various levels of access granted and controlled?  Who at the vendor has access to my data? Is there background screening? How are users authenticated? What is the password management functionality What type of physical security is provided for your data center?  How are the various levels of access granted and controlled?  What security audits and/process audits do you comply with?  Is there explicit contract language for who owns data and how data can be used?
  • 19. Alphabet Soup Certification Purpose SSAE 16, SOCC1 and 2 Auditing standard to ensure appropriate controls for your hosting provider. Certification of controls for privacy and security. TRUSTe Certification Privacy protection certification PCI DSS Certifies data security of credit card payment processing FedRAMP Government program that provides a standard approach to security assessment, authorization and monitoring of cloud products and services FIPS 140-2 Federal Information Processing Standard for accrediting data encryption standards ISO 27001 Audit and risk assessment framework for information security management Vendors who are serious about security will certify on multiple of these based on the service.
  • 20. Responding to a Breach Have a Plan – Key Elements First 24 Hour Checklist Notification Requirements Other Services
  • 21. Elements of a Good Response Plan Define a response team with clear roles and responsibilities  Executive Leader, IT, Public Relations, Student Services, Legal, Law Enforcement Liaison  Assign somebody to maintain a contact list quarterly basis Have a documented plan and procedure for investigation, notification, support, legal review Plan for increased call volume to a call center or other support help line Provide for FAQ and support materials on Institution Website and/or student portals Have policy for cases that warrant complimentary identity protection and credit monitoring services Pre-selection of a data forensic vendor to assist in breach response Pre-selection and negotiation with a Breach Resolution Vendor who can guide you through process of planning and support response
  • 22. First 24 Hour Checklist  Record dates and times – Discovery, Response start Alert Response Team – Internal and external resources as identified in your plan Stop additional data loss – Take care to maintain forensic evidence Secure premise or equipment to preserve evidence Document Incident Report – Key facts, who discovered and when, scope of breach. Interview individuals who found breach Bring in forensics team Notify law enforcement Assess priorities and risks Set response plan in action for notification, PR, call center and execution of support service (Credit Monitoring - Experian Data Breach Response Guide
  • 23. Notification Requirements California Civil Code s. 1798.29 and California Civil Code s. 1798.82 DOE Privacy Technical Assistance Center  Consider notifying Family Policy Compliance Office (FPCO) about the breach. (FERPA does not require that you notify FPCO of the breach; however, the U.S. Department of Education considers it a best practice.  FPCO can assist educational agencies and institutions by helping to determine the potential for harm resulting from the release of the information California Office of Privacy Protection  Notify Attorney General for breach > 500  Notify Credit Agencies if breach > 10,000 -http://oag.ca.gov
  • 24. Notification to Students  Speed, Openness and transparency are the keys  Notify individuals within 10 business days of confirming the breach  The date of the notice. If the notice was delayed as the result of a law enforcement investigation, say so.  A general description of the breach incident.  The specific types of personal information that were involved.  The name and contact information  The toll-free telephone numbers and addresses of the major credit reporting agencies, but only in a breach involving Social Security numbers or driver’s license or California ID numbers.  What you have done to protect the individual’s personal information from further unauthorized acquisition.  What your organization will do to assist individuals, including providing your toll free contact telephone number for more information and assistance.  Information on what individuals can do to protect themselves from identity theft, as appropriate for the specific type of personal information involved. - http://oag.ca.gov/sites/all/files/agweb/pdfs/privacy/recom_breach_prac.pdf
  • 26. Our cloud-based products help financial aid departments save time, decrease costs, lower security risk and improve the student experience. campuslogic.com Gilbert, AZ Chris Chumley, COO chris.chumley@campuslogic.com Follow on Twitter @cschumley

Editor's Notes

  1. What other costs do you see of a breach?
  2. What is your responsibility for protecting student data as an individual and as an FA Office?
  3. How do you address security awareness at your campus for students and/or staff?
  4. Self-test: How many of you re-use the same password on multiple websites and you email so you can remember it? How many of you have a post it note, a notepad file or other place where you keep passwords? Apple Breach – 500 most common passwords with no account locking.
  5. Utah state recent breach due to accidentally forwarded email Customer just yesterday emailed screen shots This is just a few examples other than the technical vulnerabilities Web mail is even less secure How many of you use email and scanned documents as your primary method of collecting documentation from students? What alternatives are there?
  6. Gartner predicts that cloud computing will be the bulk of ne IT-related spending in 2016. Cloud technologies and Software-as-a-service models have changed how solutions are sold and purchased. Business users are now driving the process. How do you screen for security before bringing a vendor solution to the table? What should I be asking vendors before making a purchase? A good cloud vendor should have answers to these readily available and in writing. This will allow you to screen and then depending on the purchase schedule a more in depth call with the vendor and your IT team.
  7. Research shows that individuals affected in a breach who receive free credit monitoring are six times less likely to file a lawsuit. This is also an investment to address loss of trust and reputation.
  8. What are your notification requirements?
  9. Formal written notification using plain simple language, guiding sub headings. Avoid jargon or technical language