Document 15689950

advertisement
OBJECTIVES

Learn about UC’s Privacy and Information Security Work

Understand Societal Perceptions of Privacy and Security

Distinguish between Privacy and Security

2015 Hot Topics
HINT: THEY AREN’T THE SAME
The Internet and Security
2014: A YEAR TO FORGET
UC’S DEFINITIONS
Autonomy Privacy: individual’s ability to conduct activities without concern
of or actual observation
Information Privacy: the appropriate protection, use, and dissemination of
information about individuals. This protects data about people.
Information Security: supports the protection of information resources from
unauthorized access, which could compromise the confidentiality, integrity,
and availability of those resources. This protects information and
infrastructure.
What Is Privacy?
Privacy: concerned with the collection
and use of personal data related to
the mission of the organization
 Compliance – what data do we hold
and what laws do we need to follow
to ensure privacy?
 Philosophy & Ethics – what does
“privacy” even mean, and why do we
care?
What Is Security?
Security: concerned with the
confidentiality, integrity and
availability of data
 Confidentiality – rules for access to
data; ensure authorized access
(similar to privacy)
 Integrity – maintaining and
assuring the accuracy and
consistency of data
 Availability – reliable access to data
UC DEFINITIONS
The Difference: Privacy & Security
Privacy
Security
 Privacy: concerned
with the collection and
use of personal data
required for mission.
 Security: concerned
with the protection of
data required for the
mission.
7/12/2016
9
SENSITIVE DATA IN HIGHER ED
Education
Information
Audience:

Employees

Students

Third parties
Sensitive
Data
Just because we can, does that mean
we should?
Are our actions it in the best interest of:
•
the system?
•
the campus?
•
the user?
How do we decide?
Health
Information
Ideas
Employment
Information
Identities
Problems &
Dispute
UC STRUCTURES
Presidential Privacy & Information Security Initiatives

Privacy and Information Security Initiative

“GERI” or Cybersecurity Risk Reduction Initiative
Understanding the Structures:

Who are the players?

What does it do?

Where does it sit?

When does it meet?

How do they intersect?
INTERSECTIONS: UC FUNCTIONS
Business
Area
Compliance
Counsel
Info Sec
Privacy
Procurement
INTERSECTIONS: TOPICS
Cloud
Computing
Surveillance
Incident
Response
Encryption
Data
Storage &
Collection
Data
Classification
Vendor
Contracts
Records Use
& Release
Academic
Freedom
THANK YOU AND KEEP THE DIALOGUE GOING
HELP
TALK
LEARN
ACT
UC PRIVACY & INFO SEC SYSTEMWIDE RESOURCES
Key Privacy Resources:
• Institutional Privacy: Campus Privacy Officials
• Healthcare Privacy: HIPAA Officers
Key Security Resources:
• Campus Information Security Officers
• HIPAA Information Security Officers (some shared from above)
• IT Policy and Security Committee
2015 UC HOT TOPICS IN PRIVACY & SECURITY
1. Information Security Policy update and Data Classification
2. Role of Privacy in Incident Response
3. Cybersecurity Insurance
4. Vendors: Data Privacy & Security Risks Assessments and Contracts
5. Cloud Computing
WHAT ARE YOUR HOT TOPICS?
6.
??
7.
??
8.
??
9.
??
10. ??
QUESTIONS?
CONTACT INFORMATION
Roslyn Martorano
Systemwide Privacy Manager
roslyn.martorano@ucop.edu | (510) 987-0564
David Rusting
Chief Information Security Officer
david.rusting@ucop.edu | (510) 987-0086
Download