Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November...

49
Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005
  • date post

    18-Dec-2015
  • Category

    Documents

  • view

    217
  • download

    1

Transcript of Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November...

Page 1: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

Data Classification & Privacy Inventory Workshop

Implementing Security to Protect Privacy

November 2005

Page 2: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

2

Welcome & Introductions

Debra Reiger, State Information Security OfficerJoanne McNabb, California Office of Privacy ProtectionLester Chan,, California Office of HIPAA Implementation

Page 3: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

3

Workshop Agenda

Welcome & Introductions - Debra ReigerInformation Privacy & Security - Joanne McNabbIntroduction to State Policy on Data Classification - Debra ReigerBreakProtected Health Information - Lester ChanConducting a Privacy Inventory - Joanne McNabbWorkshop Exercise - Lester Chan

Page 4: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

4

Information Privacy & Security

Privacy: Individual’s interest in controlling the handling of his/her personal informationSecurity: Organization’s interest in protecting information assets from unauthorized acquisition, damage, disclosure, manipulation, modification, loss, or useInformation security is essential to privacy protection.

Page 5: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

5

“Personal information is like toxic waste – Managing it requires a high level of skill and training.”

-Phil Agre, Technology and Privacy in a New Landscape

Page 6: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

6

Why Protect Personal Information

Law and Policy Information Practices Act, HIPAA Data Classification, Encryption (soon)

Risk Reduction SAM Security breach notification law (Civil Code §

1798.29) – Cost of notification $1-$25 per notice

Identity Theft > 9 Million victims and $52.6 Billion in 2004

Page 7: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

7

Protecting Personal Information

1. Classify data and identify records systems containing personal identifying information.

2. Locate records needing special protection:

Notice-Triggering Personal Information Health Information (Protected or Electronic)

3. Protect with appropriate security measures

Administrative, Technical, Physical

Page 8: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

State Policy on Classifying Data

Classification of Information

Page 9: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

9

Introduction

State policy requires that we identify and classify our data and protect it appropriately.

See SAM Sections 4840-4845

Automated files and databases are essential public resources.

We are the protectors of the public’s information.

We must first classify and locate data before we can properly protect it.

Page 10: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

10

Information Protection

Give appropriate protection from unauthorized: Use Access Disclosure Modification Loss Deletion

Page 11: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

11

Information Classifications

Public InformationConfidential Information

Page 12: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

12

Public Information

Information not exempt from disclosure under the provisions of the California Public Records Act or other applicable state or federal laws

Page 13: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

13

Confidential Information

Information exempt from disclosure under the provisions of the California Public Records Act or other applicable state or federal laws

Page 14: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

14

Sensitive & Personal Info

Sensitive and personal information may occur in public and/or confidential records.Files and databases containing sensitive and/or personal information require special precautions to prevent inappropriate disclosure.

Page 15: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

15

Sensitive Information

Requires special precautions to protect from: Unauthorized use Access Disclosure Modification Loss Deletion

Page 16: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

16

Sensitive Information

May be either Public, or Confidential.

Requires a higher than normal assurance of accuracy and completeness.Key factor is integrity.Typical records are agency financial transactions and regulatory actions.

Page 17: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

17

Personal Information

Identifies or describes an individualMust be protected from inappropriate Access Use Disclosure

Must also be accessible to data subjects upon request

Page 18: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

18

Personal Information

Identifies or describes an individual: Name Home address Home phone etc.

Sub-types of Personal Information: Notice-Triggering Personal Information Medical Information

Protected Health Information Electronic Health Information

Page 19: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

19

Notice-Triggering Personal Info

Name plus specific items or personal information: Social Security Number Driver’s license/I.D. card number Financial Account Number

Requires notifying individuals if it is acquired by an unauthorized person.

Page 20: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

Protected Health Information

HIPAA Covered Entities

Page 21: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

21

Protected Health Information

Individually identifiable information created, received, or maintained by health care payers, providers, health plans or contractors, in electronic or physical form.State and federal laws require special precautions to protect from unauthorized use, access, or disclosure.

Page 22: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

22

Electronic Health Information

Individually identifiable health information transmitted by electronic media or maintained in electronic media

Page 23: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

23

Electronic Health Information

Health plans, clearinghouses or providers must ensure the privacy and security of electronic protected health information from unauthorized use, access or disclosure

Page 24: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

24

Current Information

Assess current systems for protected health information in physical (paper) and electronic form.Include personal information in the data classification portion of risk analysis and risk management Risk analysis and risk management are

required of HIPAA covered entities

Page 25: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

25

Future Data Systems

Be aware of these data classifications as more data is created, maintained or transmitted.Plan for protecting your data during the system design phase.Collect data that you have the authority and need to collect.

Page 26: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

Conducting a Privacy Inventory

Where is your data? Where is your personal data?

Page 27: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

27

Privacy Inventory Process

1. ISO/PO gets management support.2. Each division/program identifies “Privacy

Contact.” ISO/PO explains process to Privacy Contacts.

3. Privacy Contacts complete Privacy Inventory Worksheet.

4. ISO/PO/Program implement appropriate safeguards.

5. ISO/PO conduct ongoing privacy awareness training for users (more on this later).

Page 28: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

28

Overview of Worksheet

Part I: Records System Inventory

Part II: Privacy Practices Inventory

Page 29: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

29

Part I of Inventory Worksheet

Records Systems Containing Personal Information Start with Records Inventory for

Records Retention Schedule List only Records Systems containing

personal information

Page 30: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

30

1. Records System

Group of records maintained for official purposesSame as “Records Series” in Records Retention Handbook: Group of related records under a single filing category that deal with particular subject

Page 31: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

31

Personal Information

Information that describes an individual, including name, home address, home phone, etc. – defined in Civil Code 1798.3Information on clients, consumers, applicants, licensees, employees, contractors – everyone

Page 32: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

32

2. Description of Records

Examples Applications for general contractor’s

license Personnel records of current employees Case records of recipients of in-home

supportive service, past and present Consumer complaints

Page 33: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

33

3. Sources of Records

Examples: Subject supplies information on

application form Schools provide information on

transcripts. DOJ provides information from criminal

history records

Page 34: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

34

4. Owner and Location

1. Owner: Department/Division/Program that collects and maintains the records

2. Location: Agency name and address where original records system is located

3. Contact: Name, title, business contact information of agency official responsible for records system

Page 35: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

35

5. Authority

Citation of regulation or statute authorizing agency to collect and maintain records system

Page 36: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

36

6. Media of Records System

1. Medium of “original” records system: electronic, paper, tape

2. Additional media on which records are stored or used:

PC Laptop Other portable device or medium

Page 37: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

37

7. Type of Personal Information

Objective: Identify records systems containing personal information needing special protections Notice-triggering personal information

(name plus SSN, DL/State ID number, financial account number)

Health/medical information Other personal information (Home

Address, MMN, DOB, etc.)

Page 38: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

38

Does the records system contain any confidential or sensitive information (other than personal information)? Confidential: Exempt from PRA Sensitive: For example, network

configuration, agency bank records

8. Confidential or Sensitive Info

Page 39: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

39

9. Routine Uses & Disclosures

Purposes for which records were createdUses and usersDisclosures outside agency that collects and maintains records system

Page 40: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

40

Part II of Inventory Worksheet

Privacy Practices Checklist of major practices per IPA,

Government Code, etc. Optional – but good way to start to

build privacy awareness

Page 41: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

41

1. Privacy Policy Statement

Is your agency’s privacy policy statement posted in your office(s)?Is it posted on your Web site(s)? Government Code 11019.9

Page 42: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

42

2. Rules of Conduct

Does your program/agency have written rules of conduct for handling records containing personal information? Civil Code 1798.20

If so, attach copy to Worksheet.

Page 43: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

43

3. Access Guidelines

Does your program/agency have regulations or guidelines telling individuals how they can access their own records? Civil Code 1798.34 – 1798.44

If so, attach copy to Worksheet.

Page 44: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

44

4. Notice on Collection

How do you provide notice (of authority, uses, disclosures, access procedures, etc.) when collecting personal information? Civil Code 1798.17 Printed on paper forms On online forms Other

Page 45: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

45

5. Public Records Act Disclosures

Do you have written procedures for responding to PRA requests? How do you protect personal

information in public records?

If so, attach copy to Worksheet.

Page 46: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

46

6. Retention & Destruction

Is this records system listed in your Records Retention Schedule?

Page 47: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

47

7. Incident Notification Procedures

Does the program/division/department have written procedures for notification of privacy/security incidents? For example, lost/stolen laptop

containing (possibly notice-triggering) personal information: Report as information security incident, not property theft

Page 48: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

48

Privacy Awareness

Privacy Inventory raises awareness of privacy vulnerabilities and protection requirementsOngoing awareness training for all users is essential Coming soon from COPP

Page 49: Data Classification & Privacy Inventory Workshop Implementing Security to Protect Privacy November 2005.

49

End of Presentation

QuestionsComments