Title: Data Classification
1Data Classification Privacy Inventory Workshop
- Implementing Security to Protect Privacy
- November 2005
2Welcome Introductions
- Debra Reiger, State Information Security Officer
- Joanne McNabb, California Office of Privacy
Protection - Lester Chan,, California Office of HIPAA
Implementation
3Workshop Agenda
- Welcome Introductions - Debra Reiger
- Information Privacy Security - Joanne McNabb
- Introduction to State Policy on Data
Classification - Debra Reiger - Break
- Protected Health Information - Lester Chan
- Conducting a Privacy Inventory - Joanne McNabb
- Workshop Exercise - Lester Chan
4Information Privacy Security
- Privacy Individuals interest in controlling the
handling of his/her personal information - Security Organizations interest in protecting
information assets from unauthorized acquisition,
damage, disclosure, manipulation, modification,
loss, or use - Information security is essential to privacy
protection.
5Personal information is like toxic waste
Managing it requires a high level of skill and
training. -Phil Agre, Technology and Privacy in
a New Landscape
6Why Protect Personal Information
- Law and Policy
- Information Practices Act, HIPAA
- Data Classification, Encryption (soon)
- Risk Reduction
- SAM
- Security breach notification law (Civil Code
1798.29) Cost of notification 1-25 per notice - Identity Theft
- 9 Million victims and 52.6 Billion in 2004
7Protecting Personal Information
- Classify data and identify records systems
containing personal identifying information. - Locate records needing special protection
- Notice-Triggering Personal Information
- Health Information (Protected or Electronic)
- Protect with appropriate security measures
- Administrative, Technical, Physical
8State Policy on Classifying Data
- Classification of Information
9Introduction
- State policy requires that we identify and
classify our data and protect it appropriately. - See SAM Sections 4840-4845
- Automated files and databases are essential
public resources. - We are the protectors of the publics
information. - We must first classify and locate data before we
can properly protect it.
10Information Protection
- Give appropriate protection from unauthorized
- Use
- Access
- Disclosure
- Modification
- Loss
- Deletion
11Information Classifications
- Public Information
- Confidential Information
12Public Information
- Information not exempt from disclosure under the
provisions of the California Public Records Act
or other applicable state or federal laws
13Confidential Information
- Information exempt from disclosure under the
provisions of the California Public Records Act
or other applicable state or federal laws
14Sensitive Personal Info
- Sensitive and personal information may occur in
public and/or confidential records. - Files and databases containing sensitive and/or
personal information require special precautions
to prevent inappropriate disclosure.
15Sensitive Information
- Requires special precautions to protect from
- Unauthorized use
- Access
- Disclosure
- Modification
- Loss
- Deletion
16Sensitive Information
- May be either
- Public, or
- Confidential.
- Requires a higher than normal assurance of
accuracy and completeness. - Key factor is integrity.
- Typical records are agency financial transactions
and regulatory actions.
17Personal Information
- Identifies or describes an individual
- Must be protected from inappropriate
- Access
- Use
- Disclosure
- Must also be accessible to data subjects upon
request
18Personal Information
- Identifies or describes an individual
- Name
- Home address
- Home phone
- etc.
- Sub-types of Personal Information
- Notice-Triggering Personal Information
- Medical Information
- Protected Health Information
- Electronic Health Information
19Notice-Triggering Personal Info
- Name plus specific items or personal information
- Social Security Number
- Drivers license/I.D. card number
- Financial Account Number
- Requires notifying individuals if it is acquired
by an unauthorized person.
20Protected Health Information
21Protected Health Information
- Individually identifiable information created,
received, or maintained by health care payers,
providers, health plans or contractors, in
electronic or physical form. - State and federal laws require special
precautions to protect from unauthorized use,
access, or disclosure.
22Electronic Health Information
- Individually identifiable health information
transmitted by electronic media or maintained in
electronic media
23Electronic Health Information
- Health plans, clearinghouses or providers must
ensure the privacy and security of electronic
protected health information from unauthorized
use, access or disclosure
24Current Information
- Assess current systems for protected health
information in physical (paper) and electronic
form. - Include personal information in the data
classification portion of risk analysis and risk
management - Risk analysis and risk management are required of
HIPAA covered entities
25Future Data Systems
- Be aware of these data classifications as more
data is created, maintained or transmitted. - Plan for protecting your data during the system
design phase. - Collect data that you have the authority and need
to collect.
26Conducting a Privacy Inventory
- Where is your data? Where is your personal data?
27Privacy Inventory Process
- ISO/PO gets management support.
- Each division/program identifies Privacy
Contact. - ISO/PO explains process to Privacy Contacts.
- Privacy Contacts complete Privacy Inventory
Worksheet. - ISO/PO/Program implement appropriate safeguards.
- ISO/PO conduct ongoing privacy awareness training
for users (more on this later).
28Overview of Worksheet
- Part I Records System Inventory
- Part II Privacy Practices Inventory
29Part I of Inventory Worksheet
- Records Systems Containing Personal Information
- Start with Records Inventory for Records
Retention Schedule - List only Records Systems containing personal
information
301. Records System
- Group of records maintained for official purposes
- Same as Records Series in Records Retention
Handbook Group of related records under a single
filing category that deal with particular subject
31Personal Information
- Information that describes an individual,
including name, home address, home phone, etc.
defined in Civil Code 1798.3 - Information on clients, consumers, applicants,
licensees, employees, contractors everyone
322. Description of Records
- Examples
- Applications for general contractors license
- Personnel records of current employees
- Case records of recipients of in-home supportive
service, past and present - Consumer complaints
333. Sources of Records
- Examples
- Subject supplies information on application form
- Schools provide information on transcripts.
- DOJ provides information from criminal history
records
344. Owner and Location
- Owner Department/Division/Program that collects
and maintains the records - Location Agency name and address where original
records system is located - Contact Name, title, business contact
information of agency official responsible for
records system
355. Authority
- Citation of regulation or statute authorizing
agency to collect and maintain records system
366. Media of Records System
- Medium of original records system electronic,
paper, tape - Additional media on which records are stored or
used - PC
- Laptop
- Other portable device or medium
377. Type of Personal Information
- Objective Identify records systems containing
personal information needing special protections - Notice-triggering personal information (name plus
SSN, DL/State ID number, financial account
number) - Health/medical information
- Other personal information (Home Address, MMN,
DOB, etc.)
388. Confidential or Sensitive Info
- Does the records system contain any confidential
or sensitive information (other than personal
information)? - Confidential Exempt from PRA
- Sensitive For example, network configuration,
agency bank records
399. Routine Uses Disclosures
- Purposes for which records were created
- Uses and users
- Disclosures outside agency that collects and
maintains records system
40Part II of Inventory Worksheet
- Privacy Practices
- Checklist of major practices per IPA, Government
Code, etc. - Optional but good way to start to build privacy
awareness
411. Privacy Policy Statement
- Is your agencys privacy policy statement posted
in your office(s)? - Is it posted on your Web site(s)?
- Government Code 11019.9
422. Rules of Conduct
- Does your program/agency have written rules of
conduct for handling records containing personal
information? - Civil Code 1798.20
- If so, attach copy to Worksheet.
433. Access Guidelines
- Does your program/agency have regulations or
guidelines telling individuals how they can
access their own records? - Civil Code 1798.34 1798.44
- If so, attach copy to Worksheet.
444. Notice on Collection
- How do you provide notice (of authority, uses,
disclosures, access procedures, etc.) when
collecting personal information? - Civil Code 1798.17
- Printed on paper forms
- On online forms
- Other
455. Public Records Act Disclosures
- Do you have written procedures for responding to
PRA requests? - How do you protect personal information in public
records? - If so, attach copy to Worksheet.
466. Retention Destruction
- Is this records system listed in your Records
Retention Schedule?
477. Incident Notification Procedures
- Does the program/division/department have written
procedures for notification of privacy/security
incidents? - For example, lost/stolen laptop containing
(possibly notice-triggering) personal
information Report as information security
incident, not property theft
48Privacy Awareness
- Privacy Inventory raises awareness of privacy
vulnerabilities and protection requirements - Ongoing awareness training for all users is
essential - Coming soon from COPP
49End of Presentation