9
C4HCO Security and Privacy Discussion Bill Jenkins C4HCO Security and Privacy Officer 16 October 2013

C4HCO Security and Privacy Discussion

  • Upload
    benson

  • View
    26

  • Download
    0

Embed Size (px)

DESCRIPTION

C4HCO Security and Privacy Discussion. Bill Jenkins C4HCO Security and Privacy Officer 16 October 2013. Agenda. Introductions What – Needs to be Protected? How – Does it Need to be Protected? When – Does it Need to be Protected? Who – Assistance Sites Questions and Answers. - PowerPoint PPT Presentation

Citation preview

Page 1: C4HCO Security and Privacy Discussion

C4HCO Security and Privacy DiscussionBill JenkinsC4HCO Security and Privacy Officer16 October 2013

Page 2: C4HCO Security and Privacy Discussion

22

Agenda

• Introductions• What – Needs to be Protected?• How – Does it Need to be Protected?• When – Does it Need to be Protected?• Who – Assistance Sites• Questions and Answers

Page 3: C4HCO Security and Privacy Discussion

33

Introductions

Bill JenkinsC4HCO Security and Privacy [email protected]

[email protected]@connectforhealthco.com

Page 4: C4HCO Security and Privacy Discussion

44

What Needs to be Protected

• C4HCO handles:o Personally Identifiable Information (PII)o Protected Health Information (PHI)o Payment Card Industry (PCI) datao Federal Tax Information (FTI)

• From C4HCO, Assistance Sites receive –>>> PIIo Incidental exposure to the others

Page 5: C4HCO Security and Privacy Discussion

55

What is PII?

• OMB Memorandum M-07-16 defines Personally Identifiable Information (PII) as information which can be used to distinguish or trace an individual’s identity, such as their name, social security number, biometric records, etc. alone or when combined with other personal or identifying information which is linked or linkable to a specific individual, such as date and place of birth, mother’s maiden name, etc.o Stand-alone PII: Full name, Social Security Number, Immigration Number,

etc.o Linkable PII: Bank Account Information, Credit Card Information,

Health/Dental Policy Number, Pregnancy/Disability/Incarceration Status, etc. when attached to an identifier (stand-alone PII).

• Examples of documents that contain PII:o Single Streamline Application (SSAp), Appeals Application, Citizenship

Documents, Tax Returns, W2s/Income Verification Documents, Reports

• You may only use or disclose PII as authorized as part of your job.

Page 6: C4HCO Security and Privacy Discussion

66

How Does it Need to be Protected?

• Establish technical, physical, and administrative controls that:o Authorizes access to data (grant permission)o Ensures only authorized people access the data (limit access)o Use the data to do your job and then get rid of it (minimize retention)o Transmit and store data safely (lock it up)

• C4HCO has 30+ Security and Privacy Policies o Even more procedureso Only a subset applies to you! – depends on your business modelo Will take time to fully implement

• Most Relevant o Security Training and Awarenesso Incident Responseo Personnel Securityo Accountability and Risk Managemento Use Limitation

Page 7: C4HCO Security and Privacy Discussion

77

When Does it Need to be Protected?

• Upon receipto From C4HCOo From Customer

• While being usedo Be aware of your surroundingso Stick to the script

• While stored or retainedo Is it really needed?o Apply common senseo Two tests – your own data, answering the reporter afterwards

• When done with ito Return ito Really deleted?o Valuable scraps

Page 8: C4HCO Security and Privacy Discussion

88

Assistance Sites

• Partners with C4HCOo Yet independent entities

• Business Models Varyo For some, an added serviceo For some, an primary missiono Different uses of data can be permitted

• Informed Customer Consent• Permitted C4HCO use• Get it in writing!

We will all learn and grow together

Page 9: C4HCO Security and Privacy Discussion

9

Questions and AnswersGo for it!