personal data protection and security measures

21
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013

Upload: jalia

Post on 25-Feb-2016

47 views

Category:

Documents


0 download

DESCRIPTION

Personal Data Protection and Security Measures. Justin Law IT Services - Information Security Team 25 & 27 November 2013. Agenda. Data protection. Data is one of the most valuable assets of the University - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Personal Data Protection and Security Measures

Personal Data Protection and Security Measures

Justin LawIT Services - Information Security Team

25 & 27 November 2013

Page 2: Personal Data Protection and Security Measures

Agenda

Data protection Data Classification IT Security Good practices

Page 3: Personal Data Protection and Security Measures

Data protection

Data is one of the most valuable assets of the University

Data could be any factual information that is stored on computer, USB drive, Cloud and of course, on paper.

Risks of Data: 1. Theft2. Loss3. Leakage4. Tamper

Page 4: Personal Data Protection and Security Measures

Data Classification

Page 5: Personal Data Protection and Security Measures

The importance of data classification

• Allow us to identify the data• Manage the data better• Employ appropriate level of security for the data

Page 6: Personal Data Protection and Security Measures

Three-level Data ClassificationIn order to handle data properly, data should be classified into categories- classification level.

Three-level Classification:

Public Sensitive Restricted

Page 7: Personal Data Protection and Security Measures

Three-level ClassificationPublic• Data is generally open to the public. • No existing local, national or international legal restrictions on

access. Example: Events and Activities, communications notices and publications.

Public Sensitive Restricted

Page 8: Personal Data Protection and Security Measures

Three-level ClassificationSensitive• Data is “Official Use Only”• Protected from unauthorized access due to proprietary, ethical

or privacy considerationsExample: Student Data; University partner or sponsor information where no NDA exists

Public Sensitive Restricted

Page 9: Personal Data Protection and Security Measures

Three-level ClassificationRestricted• Data is protected by regulations, University policies or

contractual agreement• Unauthorized access may result in significant financial risk or

negative impacts on the reputation of the UniversityExample: Personal Information, Payment Records, Medical records

Public Sensitive Restricted

Page 10: Personal Data Protection and Security Measures

Data Handling Level of precautions and security controls are relevant to

the data classification

More protections for more sensitive data

Page 11: Personal Data Protection and Security Measures

Data HandlingSecurity Control Public Level Sensitive Level Restricted LevelAccess Control No restriction AAA (Authentication,

authorization, accounting)

AAA,Confidentiality agreement

Copying/Printing No restriction Limited Limited with label “Confidential”

Network Security No protection Firewall, IPS,Allow remote Access

Firewall, IPS,No remote Access

System Security Best practices Hardening Hardening with specific security

Physical Security Locked Locked, CCTV Data CentreData Storage Monthly Backup Daily Backup Encryption

Data loss preventionDaily Backup

Auditing No Logging Logins Logins, access and changes

Page 12: Personal Data Protection and Security Measures

IT Security Good practices

Page 13: Personal Data Protection and Security Measures

Workstation Use complex password, more than 8 characters Enable login password and screen saver password Logout when unattended Do not install P2P software on computer that handles

confidential data Physically secure the notebook PC, tablet PC Avoid using public computer to access confidential files Using VPN or other secure channel for remotely access from

the outside of the university

Page 14: Personal Data Protection and Security Measures

StorageData could be stored on personal PC, file server, mobile phone, NAS, Cloud, etc… Access control

• Need ID and password• Read, write, deny access• Logging

Use encryption Backup

Page 15: Personal Data Protection and Security Measures

Removable Storage Only store sensitive data on portable devices or media when

absolutely necessary Use Encryption Erase the data after use Don’t leave USB drive unattended Keep it safe Don’t use USB drive from unknown source. Report to supervisor if lost USB drive that contains sensitive

data

Page 16: Personal Data Protection and Security Measures

Cloud storageBefore putting data to Cloud, you should consider: Privacy and confidentiality Data retention

Impossible to eliminate Data ownership Data Encryption

being uploaded to, or downloaded from, and stored in the cloud

Exposure of data to operator, local and foreign government

and government agency

Page 17: Personal Data Protection and Security Measures

Social NetworksSocial networks are a great way to stay connected with others, but you should be wary about how much personal information you post.

• Privacy and security settings• Once posted, always posted• Keep personal info personal• Know and manage your friends

Page 18: Personal Data Protection and Security Measures

Mobile Security“New Technology, old Privacy and Security issue” Lost or stolen devices

Enable screen lock Encrypt the data, such as email and documents Alert the automatically login of company email and

file server Malware and virus

Steal bank details, Company Data, Personal identities, Email addresses

Install mobile security apps Use Remote Wipe, Encryption and Anti-Virus

Page 19: Personal Data Protection and Security Measures

Phishing email

Hyperlink Http://evil.com/cheatu/login.htm

Sample of phishing email

Page 20: Personal Data Protection and Security Measures

Phishing is the act of attempting to acquire information such as usernames and password by pretending from a trusted entity, e.g. ITS or other department of the university

Signs of a phishing email:• Not addressed to you by name• Asks for your username and password• “Business letters” but comes from suspicious email accounts

What to do if you received phishing email Delete these suspicious emails Don’t reply or click any link on them. Refer to HKU Spam report web site http://www.its.hku.hk/spam-report

Phishing

Page 21: Personal Data Protection and Security Measures

Thank You