Data Privacy Month

YOU ARE THE TARGET: Many people mistakenly believe cyber criminals would never target them, that their computer or information has no value. In reality, individuals like yourself are the primary target. You and your computer are attacked every day. The first step to protecting yourself is realizing you are under constant attack. Having the resources at our fingertips that the Internet provides will continue to have a huge impact in how we live our lives. To safeguard our identities, our information, our data, it is important that we adopt good cyber security habits.

Week #1 - Passwords & Encryption

Passwords - Your passwords are the keys to your kingdom, so protect them wisely.

Encryption - Ensure all sensitive information is stored and transfer using encryption.

Week #2 - Data Protection and Data Destruction

Data Protection - We have a tremendous amount of sensitive information that must be protected at all times.

Data Destruction - You may not realize it, but when you delete emails, documents or any other files, that information is still on your computer. To permanently erase your data requires something called wiping.

Week #3 - PII, FERPA, and HIPPA

PII - Personally Identifiable Information - The key to protecting both yourself and our organization is to protect the confidential information you work with on a daily basis.

FERPA - FERPA requires that we protect the privacy of all student records.

HIPPA - Where must HIPAA be observed in higher education? The answer is anywhere that personally identifiable patient information is stored or transmitted.

Week #4 - GLBA for Higher Ed, PCIDSS, and Red Flags Rule

GLBA for Higher Ed - The Gramm Leach Bliley Act is a federal act that schools must adhere to in order to protect any personally identifiable financial information a customer provides to obtain a financial service or product.

PCI DSS - PCI DSS details how we must protect Cardholder data such as a credit card number and any associated information, such as expiration date, name, address, telephone number, card validation code or any other cardholder's information.

Red Flags Rule - This federal regulation is designed to help us detect warning signs (called Red Flags) of identity theft. You are required to look for and report any of these indications of identity theft.

To get more information now please check out the following websites: