Information Security Training 2012



Similar documents
NC DPH: Computer Security Basic Awareness Training

13. Acceptable Use Policy

PHI- Protected Health Information

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY

BSHSI Security Awareness Training

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Computer Network and Internet Security Awareness and Responsible Use. Indian River County School District

For All HIPAA Workforce Members Revised April 2013

So the security measures you put in place should seek to ensure that:

Information Security and Electronic Communications Acceptable Use Policy (AUP)

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

HFS DATA SECURITY TRAINING

Angard Acceptable Use Policy

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Information Security Code of Conduct

HIPAA and Health Information Privacy and Security

HIPAA Security Training Manual

Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy

HIPAA Compliance Annual Mandatory Education

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

2014 Core Training 1

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students

PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306)

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

The Department of Health and Human Services Privacy Awareness Training. Fiscal Year 2015

Information Technology Acceptable Use Policy

HIPAA Security Education. Updated May 2016

Rocklin Unified School District Employee Authorized Network, Internet Usage, and Privacy Agreement

Medina County Policy Manual

SHS Annual Information Security Training

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

REGION 19 HEAD START. Acceptable Use Policy

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer

ELECTRONIC COMMUNICATIONS: / INTERNET POLICY

The College ofBergen Online - Acceptable Use and Disposal

INTERNET ACCEPTABLE USE POLICY

Acceptable Use of ICT Policy. Staff Policy

For All Workforce Members UCSC Student Health Services Revised April 2009

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

EMPLOYEE COMPUTER USE POLICY

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure

Nondiscrimination. 1 of 10

General Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information

Revelstoke Board of Education Policy Manual

Introduction to Computer Security

COMPUTER NETWORK AGREEMENT FORM

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL

IRB, HIPAA, and Clinical Research

Topics. What are privacy and security all about? How can I protect confidential information? What should I do if I see a problem?

Network Security for End Users in Health Care

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.

ICT Acceptable Use Policy

How To Monitor The Internet In Idaho

ACCEPTABLE USE POLICY

Welcome to Information Security Training

Southwest Texas Telephone Company (SWTTC) Acceptable Use Policy for Asynchronous Digital Subscriber Line (ADSL)/Internet Customers

PROTECTING PATIENT PRIVACY and INFORMATION SECURITY

Administrative Procedures Manual. Management Information Services

Summary Electronic Information Security Policy

& Internet Policy

R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS

Peace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users

Acceptable Use of ICT Policy For Staff

Online Communication Services - TAFE NSW Code of Expected User Behaviour

THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY

Chapter 15: Computer Security and Privacy

Guadalupe Regional Medical Center

LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN

How To Use A College Computer System Safely

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

How To Protect Your Information From Being Hacked By A Hacker

City of Venice Information Technology Usage Policy

PCI Data Security. Information Services & Cash Management. Contents

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

INFORMATION SECURITY GUIDE. Employee Teleworking. Information Security Unit. Information Technology Services (ITS) July 2013

How To Use Your Cell Phone At Renaissance Academy Charter School

Infocomm Sec rity is incomplete without U Be aware,

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan ACCEPTABLE USE POLICY

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY

SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE

ANNUAL SECURITY RESPONSIBILITY REVIEW

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks

Technology Acceptable Use Policy

Protect yourself online

Information Security. Annual Education Information Security Mission Health System, Inc.

TEKAMAH-HERMAN COMMUNITY SCHOOLS LEARNING INITIATIVE POLICY AND PROCEDURES

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources

Transcription:

Information Security Training 2012 Authored by: Gwinnett Medical Center Information Security Department Modified for affiliated schools students & instructors by: Linda Horst, RN, BSN, BC

Objectives After you finish this Computer-Based Learning (CBL) module, you should be able to: Explain the basic concepts of Information Security. Explain your security responsibilities and the part you play in protecting sensitive information and assets belonging to GMC.

Topics Covered in this CBL What needs to be protected? What is information security? What are the consequences of security failure? What are the types of security failure? How can we protect against security failure?

What Needs to be Protected? Protected Health Information (PHI) Health or medical information linked to a specific individual: Identity demographic and financial data Medical condition and treatment clinical data Electronic Protected Health Information (EPHI) PHI stored on or transmitted via our computers and networks, including USB drives, CDs, PDAs, tapes, and clinical equipment

What is Information Security? Information security is the process of ensuring the confidentiality, integrity, and availability of information through safeguards. Confidentiality Prevent unauthorized access or release of PHI Prevent abuse of access (identity theft, gossip) Integrity Prevent unauthorized changes to PHI Availability Prevent service disruption due to malicious or accidental actions or natural disasters

What is Information Security? Regulations, Standards GMC Information Security policies and procedures are based on the following regulations and standards: Health Insurance Portability and Accountability Act (HIPAA) National Institute of Standards and Technology (NIST) standards Health Information Technology for Economic and Clinical Health (HITECH) Act Payment Card Industry (PCI) standards Joint Commission (JC) accreditation

Consequences of Security Failure Security failures can result in: Disruption of patient care. Increased cost to the organization. Legal liability and lawsuits. Negative publicity. Identity theft (monetary loss). Disciplinary action.

What are the Types of Security Failure? There are two types of security failure: 1. Intentional attack 2. Employee/academic affiliate carelessness Intentional attack Malicious software (viruses) Stolen passwords Impostors calling or emailing to steal information (phishing) Theft (laptop, PDA) Abuse of privilege (employee/academic affiliate/vip clinical data)

Types of Security Failure, continued Employee/academic affiliate carelessness Sharing passwords Not signing off the systems Downloading and executing software Improper use of email or web surfing Not questioning or reporting suspicious or improper behavior

Protection Against Security Failures We protect against security failure by: Using email and the internet appropriately. Creating strong passwords. Securing desktops and portable devices. Following minimum necessary. Reporting breaches.

How Do We Protect Against Security Failures? Appropriate Use of Email & Internet When you use GMC information technology and computer systems, your activities are not private. GMC monitors activity that occurs on its network, including: Internet use, Corporate email, Web-based email (Yahoo, Hotmail, Gmail), and Instant messaging.

How Do We Protect Against Security Failures? Appropriate Use of Email & Internet, cont. GMC monitors computer use to ensure that: Sensitive information is sent out correctly. No sexually harassing or pornographic communications are taking place. Associates are using time and resources appropriately. Associates are viewing appropriate websites. If you misuse GMC computer equipment, you are subject to disciplinary action.

How Do We Protect Against Security Failures? Appropriate Use of Email Do not open emails from someone that you do not know. Do not forward work emails to a non-ghs email account. Do not send emails that contain: Profanity, obscenities or derogatory remarks. Pornographic material. Threats and hate literature. Chain letters inside or outside the organization. Sexual, ethnic, racial or other workplace harassment.

How Do We Protect Against Security Failures? Appropriate Use of Email, continued Be aware of risks, including spam and phishing emails: Spam is unsolicited bulk email, including: Commercial solicitations, advertisements, chain letters, pyramid schemes and fraudulent offers. Do not reply to or forward spam messages. Phishing emails pretend to be from trusted names, such as Citibank or PayPal or Amazon, but direct recipients to rogue sites. Never click on a link in a suspicious email. A reputable company will never ask you to send your password through email.

How Do We Protect Against Security Failures? Appropriate Use of the Internet You may not visit inappropriate internet sites or engage in inappropriate communications. Examples of sites or communications that are inappropriate: Pornographic Culturally offensive Racist or hate-related Related to gambling Related to computer hacking Terroristic

How Do We Protect Against Security Failures? Email, Internet and Viruses Computer viruses: Computer viruses are dangerous programs that: Run on a computer without the knowledge or permission of the user, and Are meant to damage your computer or to gain access to your information. Viruses can: Spread onto computer discs and across a network. Corrupt data files. Format your hard drive. Delete files. Install software that will allow a hacker access to your system. Cause a total failure of a computer system.

How Do We Protect Against Security Failures? Email, Internet and Viruses, cont. Viruses spread through: Jump drives, CDs, Internet sites, File downloads, and Email. Never: Download software or files from the Internet. Contact the Customer Response Center (CRC) if you need to install software on your PC. Open unknown or unexpected email attachments. Download files from discs or jump drives: Received from a source you do not trust. Created by an unprotected computer. Open email from someone you do not know.

How Do We Protect Against Security Failures? Social Networking Do not access social networks while on GMC campuses. Do not use information gained as a result of your position with GMC to contact or communicate with patients, clients or third-party business associates. Do not share information related to: Our corporation, Patients, or Clients. Represent GMC in a professional manner at all times. If you post anything from a GMC email address: Include a disclaimer stating that the opinions you ve expressed are strictly your own and not necessarily those of GMC. Exception: The posting is in the course of business duties.

How Do We Protect Against Security Failures? Creating Strong Passwords Do choose strong passwords. A strong password: Is at least 8 characters long, and Contains a combination of capital letters, lower case letters, numbers, and characters. Don t share your passwords. This makes you responsible for the actions others take with your computer access. Don t store passwords in your office or where they are accessible to others. Don t use the remember password feature on computer systems. Do change your password if you suspect a breach, and report it to the CRC at x23333.

How Do We Protect Against Security Failures? Secure Desktops and Portable Devices Log off and exit computer programs when leaving a work station. Ensure that your computer screen is turned so that passersby cannot read information on the screen. Notebook computers and portable devices: Never leave them unattended. Lock them up! Never leave them visible in your car. Store as little sensitive information on them as possible. If your notebook computer or portable device is lost or stolen, report it to the Information Security and Public Safety departments Immediately. Use an encrypted USB drive if you must store or transport data. Do so only if there is a business purpose. Contact the CRC at x23333 to obtain an encrypted USB drive.

How Do We Protect Against Security Failures? Secure Desktops, Portable Devices, cont. Be aware of social engineering, which is the process of tricking or manipulating someone into giving access to sensitive information. Examples: Tailgating: One or more person(s) follow(s) an authorized person through a secured door or other entrance. Shoulder surfing: Direct observation techniques, such as looking over someone s shoulder to get information. Impersonation: A person pretends to be someone he or she is not in order to gain information. For example, you receive a phone call from someone claiming to be a PC tech or GMC associate requesting such information as: Passwords, User name, or Other sensitive information.

How Do We Protect Against Security Failures? Secure Desktops, Portable Devices, cont. Media disposal: You must dispose of media containing sensitive information so that the information cannot be accessed by any unauthorized person. Proper media disposal methods: Paper records: Place in shred bins. CDs: Take to Information Services (Operations). Hard disc drives: Contact the CRC at x23333.

How Do We Protect Against Security Failures? Follow Minimum Necessary Minimum Necessary means limiting access to PHI that is used only to complete your task or job. Never access any information without a business purpose. Do not abuse clinical access privileges. Report abuse if you observe it. Never copy or duplicate PHI without appropriate authorization.

Reporting Incidents or Breaches If you believe an information security incident or breach has occurred: Let your instructor/manager know, especially if you notice any problems with meeting the rule requirements. Report incidents or breaches of sensitive GMC information to: Security hotline: 404-291-8233 or E-mail: Information-Security@gwinnettmedicalcenter.org or Corporate Compliance Hotline: 888-696-9881.

Reporting Incidents, Breaches, cont. GMC takes disciplinary actions in response to confirmed information security breaches. If you fail to report a known or suspected breach, or if you report a breach for malicious reasons, you might receive a disciplinary action. The Information Security department investigates all suspected information security breaches. Disciplinary action may result in termination of employment/student experience. As an associate, if you disagree with the disciplinary action, you can file a grievance.

Information Security Policies You can access the information security policies covered in this CBL on GwinnettWork. 9530-100 Information Security Program 9530-101 Information Security Training 9530-102 Disposal of Media Containing Sensitive Information 9530-104 E-mail Usage 9530-105 User Password Management 9530-106 Internet/Intranet Usage 9530-108 Virus Checking 9530-109 Acceptable Use of Computer Equipment 9530-125 Social Networking 9530-127 Securing Sensitive Information in Work Area 300-517 Associate Disciplinary Actions for Confidentiality and Information Security Breaches

Congratulations! You have completed this CBL module. See the next link to take the Information Security Test. Questions? Contact Information Security: Kelly Keeler 678-312-4381 Allen Olmstead 678-312-4243