Full Disk Encryption. Larry Carson, Associate Director, Information Security Management

Similar documents
Protecting Personal Health Information on Mobile and Portable Devices. Guidance from the Information and Privacy Commissioner of Ontario

HIPAA and HIPAA Compliance with PHI/PII in Research

Hospital Council of Western Pennsylvania. June 21, 2012

Mobile Computing and Storage Devices Security Workshop. Mobile Computing and Storage Device Security. Today s Plan. Why Bother?

How To Encrypt a Windows 7, 8.1 or 10 laptop or tablet

Office 365. It s Past, Present and Future at UW

Information Technology Standards

Why you MUST protect your customer data

LCU Privacy Breach Response Plan

Unified Communications Phase 2 Presentation to IT Services Users Group

Mobile Device Policy. Augusta University Medical Center Policy Library. Policy Owner: Information Technology Support and Services

IAM Security & Privacy Policies Scott Bradner

Jeff Wilbur VP Marketing Iconix

Information Security Policy for Associates and Contractors

Subject: University Information Technology Resource Security Policy: OUTDATED

ALBERTA OFFICE OF THE INFORMATION AND PRIVACY COMMISSIONER P2010-ND-007 IPSOS NORTH AMERICA. November 10, (Case File #P1704)

HIPAA in 2017: Hot Topics You Can t Ignore. Danika Brinda, PhD, RHIA, CHPS, HCISPP March 16, 2017

Minimize litigation risk Discuss security best practices Review security tools and techniques Identify seven cybersecurity must-do s

Privacy Impact Assessment (PIA) Tool

Mobile Computing Policy

THE PROCESS FOR ESTABLISHING DATA CLASSIFICATION. Session #155

Welcome to CON IT Support. Justin Burley, Campus IT Director and Information Security Manager Colin Wheeler, IT Professional

Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services.

Data Compromise Notice Procedure Summary and Guide

Protecting Health Information

CeBIT Preview January Make the cloud a safer place

mhealth SECURITY: STATS AND SOLUTIONS

Computing Resources. at the University of Pittsburgh Tuesday, June 27, 2017

HIPAA 101: What All Doctors NEED To Know

Data Security Essentials

Security. Bob Shantz Director of Infrastructure & Cloud Services Computer Guidance Corporation. All Rights Reserved.

Family Medicine Residents HIPAA Highlights May 2016 Heather Schmiegelow, JD

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15

Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D.

Physical Safeguards Policy July 19, 2016

HIPAA Security and Research VALERIE GOLDEN, HIPAA SECURITY OFFICER

Product Brief. Circles of Trust.

Challenges Managing Self-Encrypting NAND Flash Devices

Red Flags Program. Purpose

Electronic Communication of Personal Health Information

Building a Privacy Management Program

June 2012 First Data PCI RAPID COMPLY SM Solution

Technology Security Failures Common security parameters neglected. Presented by: Tod Ferran

Going Paperless & Remote File Sharing

Breach Notification Assessment Tool

Enviro Technology Services Ltd Data Protection Policy

Data Loss Assessment and Reporting Procedure

Cyber Attack: Is Your Business at Risk?

Cybersecurity is a Team Sport

2016 Data Protection & Breach Readiness Webinar Will Start Shortly. please download the guide at

Managing Cybersecurity Risk

A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016

STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY

2014 SCCE Compliance & Ethics Institute. Session 506 Bring Your Own Device(BYOD)

Jim Donaldson, M.S., MPA, CHC, CIPP/US, CISSP. Director of Compliance, Chief Privacy and Information Security Officer. Pensacola, Florida

DON T GET STUNG BY A BREACH! WHAT'S NEW IN HIPAA PRIVACY AND SECURITY

Personal Communication Devices and Voic Procedure

UTAH VALLEY UNIVERSITY Policies and Procedures

A practical guide to IT security

Mobile devices boon or curse

Information Technology Services. Informational Report for the Board of Trustees October 11, 2017 Prepared effective August 31, 2017

2017 RIMS CYBER SURVEY

Canadian Access Federation: Trust Assertion Document (TAD)

GUIDE TO STAYING OUT OF PCI SCOPE

PGP Whole Disk Encryption Training

Data Encryption Policy

Kaspersky Small Office Security 5. Product presentation

The University of British Columbia Board of Governors

NOTE: The first appearance of terms in bold in the body of this document (except titles) are defined terms please refer to the Definitions section.

Why Implement Endpoint Encryption?

BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace

Bring Your Own Device Policy

USAHS Library Policy and Procedures on Circulation

Putting It All Together:

Corporate Information & Computing Services. IT Services For University Staff.

Vendor Security Questionnaire

PCI Compliance. What is it? Who uses it? Why is it important?

Privacy Breach Policy

Lesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA)

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Cybersecurity in Higher Ed

Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise

Data Protection in Practice

HIPAA Faux Pas. Lauren Gluck Physician s Computer Company User s Conference 2016

Data protection. 3 April 2018

Data Breach Notification Policy

Welcome toa webinar about understanding BC s Personal Information Protection Act or PIPA for short.

New! Checklist for HIPAA & HITECH Compliance Pabrai

Mobile security: Tips and tricks for securing your iphone, Android and other mobile devices

File Encryption. Steven M. Bellovin

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy

Cyber Security Issues

Security and Privacy Breach Notification

EHR SECURITY POLICIES & SECURITY SITE ASSESSMENT OVERVIEW WEBINAR. For Viewer Sites

Healthcare HIPAA and Cybersecurity Update



WHITE PAPER. HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty

The University of Texas at El Paso. Information Security Office Minimum Security Standards for Systems

COMPUTER & INFORMATION TECHNOLOGY CENTER. Information Transfer Policy

Transcription:

Full Disk Encryption Larry Carson, Associate Director, Information Security Management

What Security Really Looks Like at UBC

News-worthy Security Incidents VGH Loss of 450 medical records via Resident laptop & USB drive Lost/stolen at Toronto airport (Late Sep 2011) UVic Loss of 11,845 employee records incl. banking info Stolen USB stick (Jan 2012) UBC Laptop Loss & Recovery with 50,000 records Stolen from vehicle (Feb 2012) Elections Ontario ~2.4 million voter records lost (2) Unencrypted USB sticks (Apr 2012) Human Resources and Skills Development (HRSD) 583,000 student Loan records lost external hard drive (Jan 2013) Canada s Privacy Commissioner s Office 800 employee records lost external hard drive (Feb 2014) BC Ministry of Education Loss of 3.4 million student records External hard drive missing (Sep 2015) UBC Loss of 160 student records TA Laptop stolen from campus (Oct 2015)

Definition of Personal Information recorded information about an identifiable individual, not including contact information Contact information: information to enable an individual at a place of business to be contacted, including the name, position name or title, business telephone number, business address, business email or business fax number of the individual 4

10 Things You Must Know about Privacy 1. You must be able to identify personal information 2. Your regular work activities are not private 3. Embarrassment is not a valid reason to withhold records 4. Use privacy notifications to collect personal information 5. Retain personal information for at least one year 6. Disclose personal information on a need to know basis 7. Protect personal information using reasonable security 8. Don t store personal information outside Canada 9. Report privacy breaches promptly 10. Do privacy impact assessments for new projects 5

16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0 UBC Recent Stats on Thefts (2015) Thefts of Devices Storing UBC Data 0 2 1 0 0 0 May June July August September October November December 2 2 4 0 9 4 11 Encrypted Unencrypted

Must Comply Policies, Procedures, Standards & Guidelines Policies Lower Detail Recommended Procedures Standards Guidelines Greater Detail

UBC Policies & Standards #104 Acceptable Use and Security of UBC Electronic Information and Systems (June 2013) http://cio.ubc.ca/securitystandards (10) Standards for All Users (11) Management & Technical Standards

21 Standards Incl. Cryptographic Controls Encryption Requirements Cryptographic Controls Mandatory Mobile Device Encryption Strong Passwords or Passphrases Key Escrow Laptop FDE Portable Storage Devices Smartphone/ Tablet

Device Encryption: What to Encrypt Encrypt Laptops UBC provides a commercial solution at no cost Encrypt High risk desktops/servers Encrypt Storage Devices Encrypt Smartphones/Tablets Encrypt Personally owned devices if they contain UBC Personal Information (PI)

Device Encryption: Who does it apply to? Faculty Staff (TA s & GRA s incl.) All UBC employees who handle PI

Tools McAfee Windows & Mac Manages local FileVault on Mac Manages local Bitlocker on Windows Symantec PGP Original pilot was 1000 seats Was used for Windows, Mac and Linux Is now on hiatus

Devices To be encrypted Laptops all with PI Desktops that are high risk (traffic, data, etc.) Exemptions Eligible: laptops that do not/will not contain PI. e.g. certain research lab computers

Other Considerations Don t keep more data than you need on mobile devices Delete records that aren t needed Backup old class lists to network shares and delete them from the device Delete Columns/Attributes that aren t needed especially high sensitivity PI (PHI, SIN, DoB, etc.) Don t store class lists in the cloud (e.g. DropBox, Google, etc.) Use Workspace 2.0 the data stays in Canada (at UBC)

Impacts Breach notification Fines of up to $500,000 Costs to the Dept Reputation damage Grants

HTTP://XKCD.COM/538/ A Parting Note on Reality vs. What we Think

Contact Larry Carson, Associate Director, Information Security Management larry.carson@ubc.ca 604.822.0773 Twitter: @L4rryC4rson