SlideShare une entreprise Scribd logo
1  sur  8
An ITS Security Training Module Version Oct 2009 v3 CLICK “FULL” TO VIEW SLIDE IN FULL SCREEN.
Many types of Sensitive Information are stored on your computer.  It is important to protect it from hackers who wish to cause harm. Sensitive Information
Sensitive Information & Your UNC Job Section: Sensitive Information Access Sensitive Information only when required to complete your job.   Keep your passwords secret! Comply with the University policies, such as the Acceptable Use Policy. Avoid storing Sensitive Information on mobile and portable devices. Report promptly the loss or misuse of University information to the campus IT Help Desk at (919.962.HELP),  your supervisor, or the ITS Information Security Office.
Sensitive Information Examples Section: Sensitive Information Personal information Social Security numbers Protected health information medical records  Student education records   grades or honor code proceedings Customer information  bank account information Card holder data  credit card numbers Confidential personnel information disciplinary information Some research data  data involving patents It is every employee’s responsibility to  protect Sensitive Information and keep it confidential.
Regulations Related to Sensitive Information Section: Sensitive Information Sensitive Information is subject to a number of state and federal regulations, including: FERPA (Family Educational Rights and Privacy Act) Covers educational records, including student grade information HIPAA(Health Insurance Portability and Accountability Act) Covers medical information, such as patient records
Regulations Related to Sensitive Information Section: Sensitive Information Sensitive Information is subject to a number of state and federal regulations, including: State Personnel Act   Covers information maintained in personnel files, which, with very limited exceptions, is considered confidential State Identity Theft Prevention Act  Covers information, such as Social Security numbers or the name of a person in combination with a checking account number, often sought by criminals intending to commit identity theft.
Learning Point # 2 A friend asks me to post hisresume on my Web site. The resume contains his full Social Security number. Since he gave me his permission to post the resume, the Social Security number is not considered Sensitive Information. Right? Section: Sensitive Information Wrong! In fact, Social Security numbers are considered Sensitive Information under the North Carolina Identity Theft Protection Act and should only be disclosed if absolutely necessary. Social Security numbers should never be posted on Web sites.
Learning Point #3 Section: Sensitive Information My supervisor has asked me to shred some old files. As I am going through the files, I notice grade information belonging to my neighbor’s son. I can peek at the file since my neighbor already has informed me that her son is an Honors student. Right? Wrong! In fact, student grades are considered Sensitive Information. Any Sensitive Information should only be accessed if there is a business need for such access. Accessing Sensitive Information without a business need is a violation of University policy.

Contenu connexe

Tendances

Anatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackAnatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackMark Mair
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
Computer related risks presentation
Computer related risks presentationComputer related risks presentation
Computer related risks presentationleodegras
 
Computer related risks presentation
Computer related risks presentationComputer related risks presentation
Computer related risks presentationleodegras
 
Fire eye spearphishing
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishingZeno Idzerda
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attackKarthik
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation AniketPandit18
 
Data security problems
Data security problemsData security problems
Data security problemsMathew
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystemamiable_indian
 
Spear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaSpear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaRaghunath G
 

Tendances (20)

Idenity Theft
Idenity TheftIdenity Theft
Idenity Theft
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Anatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackAnatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing Attack
 
Spear phishing attacks
Spear phishing attacksSpear phishing attacks
Spear phishing attacks
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Phishing
PhishingPhishing
Phishing
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Computer related risks presentation
Computer related risks presentationComputer related risks presentation
Computer related risks presentation
 
Computer related risks presentation
Computer related risks presentationComputer related risks presentation
Computer related risks presentation
 
Fire eye spearphishing
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishing
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attack
 
Phishing work
Phishing workPhishing work
Phishing work
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
Data security problems
Data security problemsData security problems
Data security problems
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
 
Spear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaSpear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishna
 
Phishing demo
Phishing demoPhishing demo
Phishing demo
 

En vedette

Security Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless ConnectionsSecurity Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless ConnectionsCatherine MacAllister
 
Security Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect EquipmentSecurity Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect EquipmentCatherine MacAllister
 
Security Awareness 9 10 09 V4 Workplace Policies
Security Awareness 9 10 09 V4 Workplace PoliciesSecurity Awareness 9 10 09 V4 Workplace Policies
Security Awareness 9 10 09 V4 Workplace PoliciesCatherine MacAllister
 
Security Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got MailSecurity Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got MailCatherine MacAllister
 
Security Awareness 9 10 09 V4 Appropriate Disposal
Security Awareness 9 10 09  V4  Appropriate  DisposalSecurity Awareness 9 10 09  V4  Appropriate  Disposal
Security Awareness 9 10 09 V4 Appropriate DisposalCatherine MacAllister
 
Security Awareness 9-10-09 v5 Appropriate Disposal
Security Awareness 9-10-09 v5 Appropriate DisposalSecurity Awareness 9-10-09 v5 Appropriate Disposal
Security Awareness 9-10-09 v5 Appropriate DisposalCatherine MacAllister
 

En vedette (6)

Security Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless ConnectionsSecurity Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless Connections
 
Security Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect EquipmentSecurity Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect Equipment
 
Security Awareness 9 10 09 V4 Workplace Policies
Security Awareness 9 10 09 V4 Workplace PoliciesSecurity Awareness 9 10 09 V4 Workplace Policies
Security Awareness 9 10 09 V4 Workplace Policies
 
Security Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got MailSecurity Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got Mail
 
Security Awareness 9 10 09 V4 Appropriate Disposal
Security Awareness 9 10 09  V4  Appropriate  DisposalSecurity Awareness 9 10 09  V4  Appropriate  Disposal
Security Awareness 9 10 09 V4 Appropriate Disposal
 
Security Awareness 9-10-09 v5 Appropriate Disposal
Security Awareness 9-10-09 v5 Appropriate DisposalSecurity Awareness 9-10-09 v5 Appropriate Disposal
Security Awareness 9-10-09 v5 Appropriate Disposal
 

Similaire à Security Awareness 9-10-09 v5 Sensitive Information

Recycling eDiscovery Best Practices for Data Breach Incident Response
Recycling eDiscovery Best Practices for Data Breach Incident ResponseRecycling eDiscovery Best Practices for Data Breach Incident Response
Recycling eDiscovery Best Practices for Data Breach Incident ResponseIpro Tech
 
IST Presentation
IST PresentationIST Presentation
IST Presentationguest1d1ed5
 
19012021039_Assignment-FCL.dcx
19012021039_Assignment-FCL.dcx19012021039_Assignment-FCL.dcx
19012021039_Assignment-FCL.dcxPateljignesh40
 
Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security cschumley
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
IS Know How - Third Sector Cyber Security Survey 2015 Infographic
IS Know How - Third Sector Cyber Security Survey 2015 InfographicIS Know How - Third Sector Cyber Security Survey 2015 Infographic
IS Know How - Third Sector Cyber Security Survey 2015 InfographicRobert Stones
 
C:\Fakepath\Secprimodule
C:\Fakepath\SecprimoduleC:\Fakepath\Secprimodule
C:\Fakepath\SecprimoduleBrenda Kershaw
 
What I found in my data: True data security stories
What I found in my data: True data security storiesWhat I found in my data: True data security stories
What I found in my data: True data security storiesDataGravity
 
20230906-Information-Security-and-Data-Priv.pdf
20230906-Information-Security-and-Data-Priv.pdf20230906-Information-Security-and-Data-Priv.pdf
20230906-Information-Security-and-Data-Priv.pdfSarahLopezMirasol
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Lawley Insurance
 

Similaire à Security Awareness 9-10-09 v5 Sensitive Information (20)

Recycling eDiscovery Best Practices for Data Breach Incident Response
Recycling eDiscovery Best Practices for Data Breach Incident ResponseRecycling eDiscovery Best Practices for Data Breach Incident Response
Recycling eDiscovery Best Practices for Data Breach Incident Response
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
19012021039_Assignment-FCL.dcx
19012021039_Assignment-FCL.dcx19012021039_Assignment-FCL.dcx
19012021039_Assignment-FCL.dcx
 
Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Guarding Vanderbilt information
Guarding Vanderbilt informationGuarding Vanderbilt information
Guarding Vanderbilt information
 
Protecting Vanderbilt Information
Protecting Vanderbilt InformationProtecting Vanderbilt Information
Protecting Vanderbilt Information
 
Identity theft
Identity theftIdentity theft
Identity theft
 
IS Know How - Third Sector Cyber Security Survey 2015 Infographic
IS Know How - Third Sector Cyber Security Survey 2015 InfographicIS Know How - Third Sector Cyber Security Survey 2015 Infographic
IS Know How - Third Sector Cyber Security Survey 2015 Infographic
 
Csd6059
Csd6059Csd6059
Csd6059
 
C:\Fakepath\Secprimodule
C:\Fakepath\SecprimoduleC:\Fakepath\Secprimodule
C:\Fakepath\Secprimodule
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
 
Cy bsec do_d2015
Cy bsec do_d2015Cy bsec do_d2015
Cy bsec do_d2015
 
FTC Safeguard
FTC SafeguardFTC Safeguard
FTC Safeguard
 
What I found in my data: True data security stories
What I found in my data: True data security storiesWhat I found in my data: True data security stories
What I found in my data: True data security stories
 
20230906-Information-Security-and-Data-Priv.pdf
20230906-Information-Security-and-Data-Priv.pdf20230906-Information-Security-and-Data-Priv.pdf
20230906-Information-Security-and-Data-Priv.pdf
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 

Dernier

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 

Dernier (20)

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

Security Awareness 9-10-09 v5 Sensitive Information

  • 1. An ITS Security Training Module Version Oct 2009 v3 CLICK “FULL” TO VIEW SLIDE IN FULL SCREEN.
  • 2. Many types of Sensitive Information are stored on your computer. It is important to protect it from hackers who wish to cause harm. Sensitive Information
  • 3. Sensitive Information & Your UNC Job Section: Sensitive Information Access Sensitive Information only when required to complete your job. Keep your passwords secret! Comply with the University policies, such as the Acceptable Use Policy. Avoid storing Sensitive Information on mobile and portable devices. Report promptly the loss or misuse of University information to the campus IT Help Desk at (919.962.HELP), your supervisor, or the ITS Information Security Office.
  • 4. Sensitive Information Examples Section: Sensitive Information Personal information Social Security numbers Protected health information medical records Student education records grades or honor code proceedings Customer information bank account information Card holder data credit card numbers Confidential personnel information disciplinary information Some research data data involving patents It is every employee’s responsibility to protect Sensitive Information and keep it confidential.
  • 5. Regulations Related to Sensitive Information Section: Sensitive Information Sensitive Information is subject to a number of state and federal regulations, including: FERPA (Family Educational Rights and Privacy Act) Covers educational records, including student grade information HIPAA(Health Insurance Portability and Accountability Act) Covers medical information, such as patient records
  • 6. Regulations Related to Sensitive Information Section: Sensitive Information Sensitive Information is subject to a number of state and federal regulations, including: State Personnel Act Covers information maintained in personnel files, which, with very limited exceptions, is considered confidential State Identity Theft Prevention Act Covers information, such as Social Security numbers or the name of a person in combination with a checking account number, often sought by criminals intending to commit identity theft.
  • 7. Learning Point # 2 A friend asks me to post hisresume on my Web site. The resume contains his full Social Security number. Since he gave me his permission to post the resume, the Social Security number is not considered Sensitive Information. Right? Section: Sensitive Information Wrong! In fact, Social Security numbers are considered Sensitive Information under the North Carolina Identity Theft Protection Act and should only be disclosed if absolutely necessary. Social Security numbers should never be posted on Web sites.
  • 8. Learning Point #3 Section: Sensitive Information My supervisor has asked me to shred some old files. As I am going through the files, I notice grade information belonging to my neighbor’s son. I can peek at the file since my neighbor already has informed me that her son is an Honors student. Right? Wrong! In fact, student grades are considered Sensitive Information. Any Sensitive Information should only be accessed if there is a business need for such access. Accessing Sensitive Information without a business need is a violation of University policy.