Professional Documents
Culture Documents
Information Security Guide: Case Western Reserve University
Information Security Guide: Case Western Reserve University
INFORMATION
SECURITY GUIDE
CASE WESTERN RESERVE UNIVERSITY
12/07/2021
Information Security Guide 2
Handling
Sensitive
Information
Restrict access on a
need to know basis
12/07/2021
Information Security Guide 3
HANDLING SENSITIVE INFORMATION
12/07/2021
Information Security Guide 4
HANDLING SENSITIVE INFORMATION
Best Practices
12/07/2021 6
HUMAN CAPITAL MANAGEMENT
12/07/2021 7
HUMAN CAPITAL MANAGEMENT
Best Practices
12/07/2021
Information Security Guide 8
Family Educational
Rights & Privacy Act
(FERPA)
FERPA, a federal law,
applies to student
records and
information
12/07/2021
Information Security Guide 9
FERPA
FERPA Guidelines
FERPA Guidelines
12/07/2021
Information Security Guide 11
Protect our self from Computer
Viruses
Spam Protection –
Never respond to unsolicited e-mail.
Never buy anything advertised in spam.
Internet risks –
All materials you download should comply with all
applicable laws, copyright restrictions .
Don’t assume that information found on the
Internet is necessarily accurate or up to date.
12/07/2021
Information Security Guide 12
Protect our self from Computer
Viruses
Public Wireless Hotspots
12/07/2021
Information Security Guide 13
Protect our self from Computer
Viruses (contd.)
Spyware Instrusions –
12/07/2021
Information Security Guide 14
Protect our self from Computer
Viruses (contd.)
Phishing –
Phishing is the criminally fraudulent process of
attempting to acquire sensitive information such as
usernames, passwords and credit card details by
masquerading as a trustworthy entity in an
electronic communication. A phishing webpage will
look authentic.
12/07/2021
Information Security Guide 15
MAKE HACKING IMPOSSIBLE
Never divulge information to stranger.
Verify the identity of caller who is seeking
information.
Don’t give out information about yourself or other
employees. Refer all inquiries to Human
Resources.
Never respond to online inquiries about banking,
credit card, or other personal information.
12/07/2021
Information Security Guide 16
SHOFTWARE PIRACY AND
COPYRIGHT.
Use only licensed
software on your
computer.
Do not install any
unauthorized software
on your PC
12/07/2021
Information Security Guide 17
REMOVABLE MEDIA
PROTECTION
12/07/2021
Information Security Guide 20
THANK YOU
QUESTIONS??