Workshop: Data protection in the digital office. ICO Foundation SME Workshop Technology



Similar documents
A practical guide to IT security

ICO SME data protection workshop 25 September, NEC

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

How to Practice Safely in an era of Cybercrime and Privacy Fears

MAXIMUM PROTECTION, MINIMUM DOWNTIME

When things go wrong: information governance breaches and the role of the ICO. David Evans, Senior Policy Officer

Data Protection Act Bring your own device (BYOD)

Data Security in the Insurance Industry: WHAT YOU NEED TO KNOW

Client Security Risk Assessment Questionnaire

BYOD BRING YOUR OWN DISASTER?

IT asset disposal for organisations

HARNESSING THE POWER OF THE CLOUD

Cyber Essentials Questionnaire

School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy

Data Access Request Service

10 Hidden IT Risks That Threaten Your Practice

Small businesses: What you need to know about cyber security

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

IT Strategic Plan INFRASTRUCTURE PROPERTIES AND PLANNING

How To Protect Your Data From Being Hacked

Making the leap to the cloud: IS my data private and secure?

Are You A Sitting Duck?

Nine Steps to Smart Security for Small Businesses

Data Protection Act Guidance on the use of cloud computing

Information Governance in Dental Practices. Summary of findings from ICO reviews. September 2015

Neoscope

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s

Backup & Disaster Recovery for Business

10 Hidden IT Risks That Might Threaten Your Business

Guidance on data security breach management

Security breaches: A regulatory overview. Jonathan Bamford Head of Strategic Liaison

Copyright 2013 Carbonite, Inc. All rights reserved. GETTING STARTED GUIDE CARBONITE BUSINESS

10 Hidden IT Risks That Threaten Your Financial Services Firm

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Small businesses: What you need to know about cyber security

Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses

Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

Protecting Your Data On The Network, Cloud And Virtual Servers

Originator: Chris Parkin Date: 4 March 2015 Approved by: Senior Management Team Type: Policy. Computer Security Policy

Data protection for commissioners

What You Should Know About Cloud- Based Data Backup

Mitigating Bring Your Own Device (BYOD) Risk for Organisations

The 7 Disaster Planning Essentials

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

How To Understand Your Potential Customer Opportunity Profile (Cop) From A Profit Share To A Profit Profit (For A Profit)

Data Security Best Practices. White Paper

DOBUS And SBL Cloud Services Brochure

10 Hidden IT Risks That Might Threaten Your Law Firm

THREATS. Your Business Can t Afford to Ignore. Your business depends on intelligence, but can you count on your technology?

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Bring Your Own Device Policy

BUSINESS GUIDE How to Boost Your Productivity

Kaspersky Security for Mobile

US companies experience and attitudes towards security threats

Small Business IT Risk Assessment

Cyber Security Best Practices

Managing Mobile: BYOD, MDM, MAM, and more acronyms. John H Sawyer Senior Security Analyst InGuardians, Inc.

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

MANAGED WORKSTATIONS: Keeping your IT running

Data Security in a Mobile, Cloud-Based World

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Connect Smart for Business SME TOOLKIT

How cloud computing can transform your business landscape

Introduction to Hosted Desktop Services (HDS)

Privacy and Electronic Communications Regulations

CLOSING THE NONPROFIT TECHNOLOGY DIVIDE

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

Cloud security: A matter of trust? Dr Mark Ian Williams CEO, Muon Consulting

KASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, Kaseya Catalog Kaseya Copyright All rights reserved.

USER-MANAGED FILE SERVER BACKUP:

Electronic Communication In Your Practice. How To Use & Mobile Devices While Maintaining Compliance & Security

Controls over CIS. Ryan O Halloran, Senior Manager KPMG Hobart. TAO Client Information Session. May 2015

SKSPI33 Undertake image asset management

November 4, Underwritten by:

HIPAA: Protecting Your. Ericka L. Adler. Practice and Your Patients

The Impact of Wireless LAN Technology on Compliance to the PCI Data Security Standard

Data Backup Options for SME s

Cyber Security. John Leek Chief Strategist

CLOUD IN MOTION QUESTIONS EVERY LIFE SCIENCES COMPANY SHOULD ASK BEFORE MOVING TO THE CLOUD. FRANK JACQUETTE, JACQUETTE CONSULTING, INC.

What s New with HIPAA? Policy and Enforcement Update

Mobile Security & BYOD Policy

Supplier Security Assessment Questionnaire

Network and Security Controls

Is Cloud Computing Inevitable for Lawyers?

Information Services. Protecting information. It s everyone s responsibility

SRG Security Services Technology Report Cloud Computing and Drop Box April 2013

Georgia Institute of Technology Data Protection Safeguards Version: 2.0

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

always on meet the it department PROPHET managed services ebook Business Group Meet the Always On IT Department

Coillte IT has recently upgraded the Remote Access Solution to a new platform.

PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO

Data Security and Healthcare

AWARENESS T E C H N O L O G I E S. Complete internal threat solution on the endpoint delivered as a service. A Whitepaper By Ron Penna

Stable and Secure Network Infrastructure Benchmarks

Transcription:

Workshop: Data protection in the digital office ICO Foundation SME Workshop Technology

Overview Aims and objectives Scenario-based Risks in the digital office Cloud computing Mobile devices Office relocation Discuss 3 proposals Questions?

Aims and Objectives An understanding of the risks and opportunities that various work practices pose to data protection Not all about data security Help you to identify problem areas Introduce new ways of working Analyse existing practices

Scenario My Small Business 7 employees Networked Windows XP machines Rely heavily on paper 3 employees working from central office 4 employees working from remote locations (home and remote offices) Use fax and postal services to transport paper between locations

What are the risks? Network security Windows XP; Wi-Fi; firewall; anti-virus; back-ups, disaster recovery; theft; access control; end-of-life, remote access; passwords; public internet usage Paper Easy to lose; misplace Secure storage; Lost in the post; Disposal/shredding Fax Mis-directed faxes; Fax queue; misplaced paper Remote locations Secure storage

Things need to change Rising costs Smaller head office Fewer admin staff Reduced postal budget Storage Move paper archive offsite Working with others There is an increasing opportunity to work with other organisations Subject access Currently very time consuming to locate personal data

Available tools We know what we want to achieve What tools, systems or technologies are available to achieve this?

Review the proposals 3 proposals have been prepared for discussion In groups, consider the pros and cons of each scenario How you might improve it? How might you ensure that there were appropriate security measures are in place? Consider some of the ways that the data processing may be incompatible with the DPA (consider all 8 principles) Pretend you are an employee. How might you cause a deliberate or accidental personal data breach? Pretend you are an attacker How might you find or take advantage of potential vulnerabilities?

Proposal 1 Little change from the existing work practices Purchase new laptops for office workers Dispose of XP laptops and gift 500 to remote employees to purchase their own devices to use Use an online file sharing portal (e.g. Dropbox, Box, Egress) to transfer data between office and remote locations Move paper files to archive storage

Proposal 2 Private cloud Purchase of new laptops (by the organisation) for both office and remote workers Internal network upgraded with a new infrastructure installed by an external IT services organisation Remote access to employees Employees can access email via a webmail interface from a range of different devices, including personal devices Historic paper files to be catalogued and moved to an offsite secure storage facility. Those older than 7 years will be disposed.

Proposal 3 Public cloud Move all data to an online office productivity suite (e.g. Google Apps, Office 365) Register all employees with an account Zero local storage 0 - All data in the cloud Dispose of existing IT equipment, only basic network connectivity to remain Data sharing by email attachment or email a URL to the data stored in the cloud Scan and add all archive documents to the cloud Dispose of remaining paper archives

Discuss in groups

What did you find?

Is there a better scenario?

ICO guidance A look at ICO guidance available to help you Cloud BYOD / Mobile IT Security Learning from other s mistakes Enforcement action

Cloud guidance Published 27 September 2012 Guidance for data controllers Outlines a number of key risks

BYOD guidance Published 7 March 2013 Guidance for data controllers Outlines a number of key risks

IT security Physical security Access controls Employee awareness and training Secure data on the move Keep systems up-todate Have plans for if the worst happens

Learning from ICO casework Published 12 May 2014 Review 8 common IT security failings Practical recommendations

Other guidance

Audit reports

Enforcement

Keep in touch Subscribe to our e-newsletter at www.ico.org.uk or find us on /iconews @iconews