Data Security Overview
ORSP Staff
AT Desktop Service Team
November 18th, 2014
ORSP staff will be able to:
• Recognize confidential data
• Understand the risks of exposing
confidential data
• Facilitate a dialog within ORSP for
increasing security of confidential data
Why Data Security?
What Is Confidential Data?
• Passwords, credentials, or PIN’s
• Social Security Number and Name
• Birth date + four digits of SSN and Name
• Credit Card Numbers
• Tax ID + Name
• Driver’s License, State ID, Passport
• Health Insurance Information
• Medical or Psychological Counseling Records
• Bank Account or Debit Card + access code
• More….
What Does It Look Like?
Scanned ID for Travel
Budget Spreadsheets (pre-2009)
Invoices (Tax ID)
Why Bother?
• Ethical: we care about the privacy of the records
we handle on behalf of faculty, staff, and students
• Trust and Prestige: the University is entrusted with
personal information; ORSP granting authority
• Disruption: when data is lost, lots of paperwork
must be completed, processes changed
• Financial: security Breaches are calculated as a
cost per record (sample cost = $64 per record)
Think about the institutions you transact with
(banking, medical, etc.). How do you want your
personal data handled?
ORSP and Risk Liability
• 763,000 Social Security Numbers
• 4,000 are Credit Card Numbers
• 200 passwords
(unanalyzed findings from sensitive data scan)
Example cost:
50,000 SSN’s X $64 = $3,200,000
ORSP and Confidential Data
If you’ve worked for ORSP for more than five years,
you have confidential data in your file storage.
• Payroll: SSN’s for faculty, staff, student employees,
contractors, etc.
• Fiscal: Vendor payment vouchers include Tax ID
and business name
• Travel: Passports, CaDL, State ID
• Passwords: spreadsheets or text files with
passwords to University system (or personal
How Can I Protect My Work at ORSP?
• Recognize confidential data
• Remove unused/inactive confidential data files
• Stop using confidential data files
• Secure workstation, network, storage (AT Desktop)
• Be cautious of email phishing
• Do not leave workstation unattended while logged
into sensitive systems
ORSP Next Steps
1. Reduce the amount of old or unneeded data in
ORSP storage (and by proxy, reducing the
amount of confidential data)
2. Identify where ORSP uses confidential data in its
workflow (where it currently uses it, where it can
cease to use it)
Reduce Inactive Data
Review existing share folders to identify non-active
folders/files and those that are no longer needed
Where Does We Use Confidential Data?
• What ORSP work processes generated the
confidential data?
• Are those processes still required?
More Resources…
CSU Skillport Training (will be replacing former ESIP training)
2.Select "San Francisco"
3.Login with your SF State ID and password
4.Select "My Plan"
For FERPA training:
* Find "FERPA" and click "Launch"
For Data Security & Privacy Training
* Find "Data Security & Privacy" and click "Launch"
For Questions, Contact:
AT Desktop Service
Phone: 415-405-5562
Email: [email protected]
Related flashcards


13 cards

Payment systems

18 cards

Banks of Germany

43 cards

Payment systems

59 cards

Finance ministries

62 cards

Create Flashcards