VASCO Data Security 1 End Of Live VACMAN MIDDLEWARE VASCO ENTERPRISE SECURITY.
Data security 1
Click here to load reader
-
Upload
thomas-flynn -
Category
Technology
-
view
106 -
download
0
Transcript of Data security 1
![Page 1: Data security 1](https://reader037.fdocuments.net/reader037/viewer/2022100606/55a09ff71a28abd62f8b468f/html5/thumbnails/1.jpg)
Stonehill College
Information Security
and Identity Theft
![Page 2: Data security 1](https://reader037.fdocuments.net/reader037/viewer/2022100606/55a09ff71a28abd62f8b468f/html5/thumbnails/2.jpg)
Information Security
• Data Security
• Identity Theft
![Page 3: Data security 1](https://reader037.fdocuments.net/reader037/viewer/2022100606/55a09ff71a28abd62f8b468f/html5/thumbnails/3.jpg)
Massachusetts Data Security Law
• M.G.L. 93H
• 201 CMR 17
• Personal Information
– First name or first initial and last nameAND
1. Government Issues I.D. OR
2. Financial Account Number OR
3. Social Security Number
![Page 4: Data security 1](https://reader037.fdocuments.net/reader037/viewer/2022100606/55a09ff71a28abd62f8b468f/html5/thumbnails/4.jpg)
Massachusetts Requirements
• Written Policy
– F9.2 Information Security Policy
• Safeguards
– Administrative
– Physical
– Technical
• Oversight
– Chief Information Officer
![Page 5: Data security 1](https://reader037.fdocuments.net/reader037/viewer/2022100606/55a09ff71a28abd62f8b468f/html5/thumbnails/5.jpg)
Massachusetts Requirements
• Identify records with personal information
• Routinely evaluate our safeguards
• Regular employee training
• Contractual assurances
• Share information on a need to know basis
• Document a breach
– Notify Office of the General Counsel
![Page 6: Data security 1](https://reader037.fdocuments.net/reader037/viewer/2022100606/55a09ff71a28abd62f8b468f/html5/thumbnails/6.jpg)
Identity Theft
• Federal Trade Commission
– Fair and Accurate Credit Transaction Act
– Red Flag Rules
– 16 C.F.R. 681
• College is a “creditor” with “covered accounts”
– Perkins Loan Program
– Deferred tuition payments
– Invoices to students
![Page 7: Data security 1](https://reader037.fdocuments.net/reader037/viewer/2022100606/55a09ff71a28abd62f8b468f/html5/thumbnails/7.jpg)
Identity Theft
• Identity Theft: when a person commits or attempts to commit a fraud using someone’s identity.
• Identity Theft Prevention Program
– College written document available online, or
– Request copy from the Office of the General Counsel
![Page 8: Data security 1](https://reader037.fdocuments.net/reader037/viewer/2022100606/55a09ff71a28abd62f8b468f/html5/thumbnails/8.jpg)
Identity Theft
• Identity Theft: when a person commits or attempts to commit a fraud using someone’s identity.
• Identity Theft Prevention Program
– College written document available online, or
– Request copy from the Office of the General Counsel
![Page 9: Data security 1](https://reader037.fdocuments.net/reader037/viewer/2022100606/55a09ff71a28abd62f8b468f/html5/thumbnails/9.jpg)
Technical Safeguards
adhering to best practices…
![Page 10: Data security 1](https://reader037.fdocuments.net/reader037/viewer/2022100606/55a09ff71a28abd62f8b468f/html5/thumbnails/10.jpg)
Technical Safeguards
• Antivirus
• Central File Share– Required for confidential and internal use only
information
• Virtual Private Network (VPN)
• Identity Finder– Delete (shred to DOD standards)
– Encrypt
• TrueCrypt for Laptops
![Page 11: Data security 1](https://reader037.fdocuments.net/reader037/viewer/2022100606/55a09ff71a28abd62f8b468f/html5/thumbnails/11.jpg)
Technical Safeguards
• Passwords– Minimum length of 8 characters
– At least 4 letters• Uppercase and lowercase
– Mixture of letters, numbers, and other characters• Alphanumeric and non-alphanumeric
– Cannot use your account name
– Cannot use your last 6 passwords
– Change them at least every 180 days
![Page 12: Data security 1](https://reader037.fdocuments.net/reader037/viewer/2022100606/55a09ff71a28abd62f8b468f/html5/thumbnails/12.jpg)
Information Security
…an important part of our job…