Protecting the - PowerPoint PPT Presentation

1 / 20
About This Presentation
Title:

Protecting the

Description:

What Physical Security Procedures. are in Place in Your Office? 3-5 ... Locked file cabinets. Do NOT leave sensitive information out in the open. 3-7 ... – PowerPoint PPT presentation

Number of Views:52
Avg rating:3.0/5.0
Slides: 21
Provided by: acf3
Category:

less

Transcript and Presenter's Notes

Title: Protecting the


1
Protecting the Child Support Enforcment Program
2
Learning Objectives
  • Discuss measures to address
  • Physical Security
  • Technical Security
  • Administrative Security

3
Three Major Areas of Security
PHYSICAL
TECHNICAL
ADMINISTRATIVE
4
What Physical Security Procedures are in Place in
Your Office?
5
Physical Security - Precautions
  • Security Drills
  • Evacuation Techniques
  • Bomb Threats

6
Physical Security Sensitive Data
  • Proper Handling of Sensitive Information
  • Fax Machines
  • Copy Machines
  • Locked file cabinets
  • Do NOT leave sensitive information out in the
    open

7
Fax Requirements for IRS Data
  • Staff member at both sending and receiving of fax
  • Maintain broadcast lists
  • Include a cover sheet that provides guidance to
    the recipient
  • Notification of the sensitivity/need for
    protection
  • Notice to unintended recipient to phone sender

2-5
8
Physical Security- Restricted Areas
  • Security/Restricted Areas
  • Authorized personnel only
  • Access logs
  • These logs are subject to audit by IRS

9
Technical Security Warning Banners
  • Warning Banner
  • Read and understand you are liable for civil and
    criminal penalties

10
Technical Security-Passwords
  • Passwords
  • Audit trails
  • Log-off computer when away from desk for an
    extended period of time
  • Password protected screensavers

11
Technical Security Safe Computing
  • E-mail attachments
  • Do not open attachments that you are not
    expecting

12
Technical Security Home Computing
  • DSL Lines
  • Firewalls
  • Virus Protection Software

13
Administrative Security - Sensitive Data
  • Logging of Sensitive Information
  • Record all incoming and outgoing tapes and hard
    copy
  • All sensitive information must be accounted for
  • All sensitive information must be tracked
  • Manual log with transition to automated database

14
Administrative Security - Retention Requirements
  • Federal Tax Information (FTI)
  • Governed by IRC 6103
  • National Directory of New Hires (NDNH)
  • Governed by Section 453

15
Administrative Security- Transporting Sensitive
Data
  • Authorized personnel only
  • Label all tapes or hard copy containing IRS data
    as Federal Tax Data

16
Administrative Security - Disposal
  • Burning
  • All sensitive data should be destroyed using an
    incinerator to ensure all pages are consumed
  • Shredding
  • Documents must be shred perpendicular to the
    cutting line and be in 5/16 inch wide strips or
    smaller

17
Administrative Security Incident
Handling/Reporting
  • Policies for
  • Viruses, malicious software, hoaxes, vandalism,
    automated attacks and intrusions
  • Defines roles and responsibilities for
  • Managers, Supervisors, Users

18
Administrative Security- Employee Departures
  • Employee Departure Checklist
  • Notifies Security Unit upon an employees
    departure
  • Must be submitted to the Security Unit within
    designated timeframe
  • Ensure system access, and building access are
    terminated promptly

19
Administrative Security- Workplace Violence
  • Workplace Violence
  • Policies and procedures

20
Summary
PHYSICAL
TECHNICAL
ADMINISTRATIVE
Write a Comment
User Comments (0)
About PowerShow.com