资源描述:
《DataPrivacyPointofContactOrientationSession:接触定位会话数据隐私的角度》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、DataPrivacyPointofContactOrientationSessionAgendaIntroductionSolBermannExecutiveOrderSolBermannRoleofCIO,DPPOCRickShipleyOhioITSecurityPoliciesDougAltEncryptionProtocolSamOrthAcquisitionTomHartQandAClosingSolBermann2StateofOhioITSecurityDPPOCTrainingSol
2、BermannChiefPrivacyOfficer,J.D.,CIPPStateofOhioITSecurityIntroductionUpdateonSecurityBreachStateResponse/ExecutiveOrderDataPrivacyPointofContacts4StateofOhioITSecurityDPPOCTrainingSolBermannChiefPrivacyOfficer,J.D.,CIPPExecutiveOrder2007-13SImprovingSt
3、ateAgencyDataPrivacyandSecurityWhichAgencies?MandatoryAllCabinetLevelAgenciesVoluntaryNon-CabinetLevelAgencies,BoardsandCommissions6StateofOhioITSecurityDPPOCTrainingChiefPrivacyOfficerPrivacyImpactAssessmentProtocolby8/29/07DataEncryptionProtocolby8/29/
4、077StateofOhioITSecurityDPPOCTrainingMandatoryAgenciesSecurityPolicyComplianceReportby8/14/07PrivacyImpactAssessmentImplementationby8/29/07Developplanby11/12/07forimplementingtheEncryptionProtocolAppointDPPOCby6/22/078StateofOhioITSecurityDPPOCTrainingSo
5、lBermannChiefPrivacyOfficer,J.D.,CIPPSol.Bermann@oit.ohio.gov(614)995-9928Questions?9StateofOhioITSecurityDPPOCTrainingRickShipleyAdministratorRiskManagementServicesImplementationPrivacyandSecurityPrivacy&SecurityareflipsidesofacoinPrivacy=policies,rules
6、&lawssurroundingdatausageSecurity=implementationofprotectionthatenforcesthepolicies,rules&laws11StateofOhioITSecurityDPPOCTrainingRoleofAgencyCIOHelpOverseeAgencyComplianceExecutiveOrder2007–013SPrivacy,confidentiality,security,disclosure,andsharingofinf
7、ormationProvidedirectionandoverseeactivitiesDevelopandoverseetheimplementationofpolicies,principles,standards,andguidelines12StateofOhioITSecurityDPPOCTrainingRoleofDPPOCHelpwithExecutiveorderPolicyComplianceReporting2(c)PrivacyImpactAssessmentImplementa
8、tion2(e)DataEncryptionProtocolImplementationReport2(f)Adviseorsupportdepartmentalmanagementonbusinessandpolicyissuesrelatingtoprivacy,informationassurance,andsecurityUnderstandthedatatheagencyhasandhowtheagencyusesthedataS