By: Michael Wright 
Cheryl Childers
Your 
company’s 
value is its 
data 
Company’s 
reputation 
Company’s 
liability with 
sensitive 
information 
HIPPA and 
Privacy 
Notices
• A “security breach” is defined as the unauthorized release of 
unencrypted or unredacted records or data containing personal 
information with corresponding names, such as a person’s first 
initial and last name. The acquisition of encrypted data only is a 
breach if a confidential process or key needed to unlock the 
data is also breached.
Keeping Data Secure in Large Companies
• Bad publicity 
• Loss of costumers 
• Loss in profit 
• Lawsuits 
• Increased expenses 
• New security software 
• More lawsuits 
• Companies being investigated
• Dispose of sensitive information securely 
• Shred documents 
• Use document destruction companies 
• Protect personal accounts properly 
• Keep passwords private 
• Assign and maintain access levels among staff 
• Periodically monitoring and testing the safeguards to be sure they are working effectively 
• Adjusting your security plan according to the results of testing 
• Use spam blockers 
• Background check employees
• Change passwords frequently 
• Pay in cash when able to 
• Check credit report regularly 
• Shred important documents 
• Don’t carry social security card in your wallet
• http://www.ncdoj.com/getdoc/c4549c4c-9894-4a61-b801- 
48171c01f566/Security-Breach-Information.aspx 
• http://www.business.ftc.gov/privacy-and-security/data-security

More Related Content

PPTX
Sensitive data
PPTX
Identity & Access Management
 Project Challenges and Recovery
PPTX
Data lake protection ft 3119 -ver1.0
PPTX
Office 365 : Data leakage control, privacy, compliance and regulations in the...
PDF
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
PPTX
Siskinds | Incident Response Plan
PPTX
Presentation
PDF
How to Manage Data Growth: Addressing Analysis, Security and Protection
Sensitive data
Identity & Access Management
 Project Challenges and Recovery
Data lake protection ft 3119 -ver1.0
Office 365 : Data leakage control, privacy, compliance and regulations in the...
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
Siskinds | Incident Response Plan
Presentation
How to Manage Data Growth: Addressing Analysis, Security and Protection

What's hot (19)

PDF
Data Privacy Readiness Test
PDF
BigID Data sheet: Consent Governance & Orchestration
PDF
BigID Enterprise Privacy Management Data Sheet
PPTX
Top Ten IT Legal Issues for the Enterprise
PPTX
Azure SQL Database the intelligent database – Your database on Autopilot
PPTX
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
PDF
BigID Data Inventory & Data Mapping Data Sheet
DOCX
Classifying Data to Help Secure Business Information - Template fromMicrosoft
PDF
BigID Virtual MDM Data Sheet
PPTX
How to turn GDPR into a Strategic Advantage using Connected Data
PDF
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
PPTX
Office 365 DLP Makes Data Protection Cool Again!
PDF
Building an insider threat program
PPTX
Developing a privacy compliance program
PDF
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
PDF
BigID Data Sheet: GDPR Compliance
PPTX
Identity theft and data responsibilities
PDF
BigID GDPR RoPA / Article 30 Automation Data Sheet
Data Privacy Readiness Test
BigID Data sheet: Consent Governance & Orchestration
BigID Enterprise Privacy Management Data Sheet
Top Ten IT Legal Issues for the Enterprise
Azure SQL Database the intelligent database – Your database on Autopilot
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
BigID Data Inventory & Data Mapping Data Sheet
Classifying Data to Help Secure Business Information - Template fromMicrosoft
BigID Virtual MDM Data Sheet
How to turn GDPR into a Strategic Advantage using Connected Data
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
Office 365 DLP Makes Data Protection Cool Again!
Building an insider threat program
Developing a privacy compliance program
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
BigID Data Sheet: GDPR Compliance
Identity theft and data responsibilities
BigID GDPR RoPA / Article 30 Automation Data Sheet
Ad

Similar to Keeping Data Secure in Large Companies (20)

PDF
How To Eliminate Security Exposures in Office 365 Webinar
PDF
Fraud Awareness
PPTX
Phishing Whaling and Hacking Case Studies.pptx
PPTX
Moving to the Cloud: A Security and Hosting Introduction
PPTX
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
PPTX
EM - Security and Privacy Incidents - Module 4 Powerpoint Presentation
PPTX
Cyber Security Awareness Session for Executives and Non-IT professionals
PPT
Lecture data classification_and_data_loss_prevention
PPT
Lecture Data Classification And Data Loss Prevention
PPT
Data Classification And Loss Prevention
PPTX
IH - Security Incidents - Module 5 Powerpoint Presentation.pptx
PDF
DAMA Webinar: The Data Governance of Personal (PII) Data
PPT
Tips to Protect Your Organization from Data Breaches and Identity Theft
PDF
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
PPTX
PPTX
PDF
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
PPTX
ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...
PPTX
2011 hildebrandt institute cio forum data privacy and security presentation...
PPTX
People are the biggest risk
How To Eliminate Security Exposures in Office 365 Webinar
Fraud Awareness
Phishing Whaling and Hacking Case Studies.pptx
Moving to the Cloud: A Security and Hosting Introduction
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
EM - Security and Privacy Incidents - Module 4 Powerpoint Presentation
Cyber Security Awareness Session for Executives and Non-IT professionals
Lecture data classification_and_data_loss_prevention
Lecture Data Classification And Data Loss Prevention
Data Classification And Loss Prevention
IH - Security Incidents - Module 5 Powerpoint Presentation.pptx
DAMA Webinar: The Data Governance of Personal (PII) Data
Tips to Protect Your Organization from Data Breaches and Identity Theft
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...
2011 hildebrandt institute cio forum data privacy and security presentation...
People are the biggest risk
Ad

Recently uploaded (20)

PDF
Susan Semmelmann: Enriching the Lives of others through her Talents and Bless...
PPT
Lecture 3344;;,,(,(((((((((((((((((((((((
PDF
Tortilla Mexican Grill 发射点犯得上发射点发生发射点犯得上发生
PDF
1911 Gold Corporate Presentation Aug 2025.pdf
PDF
Ron Thomas - Top Influential Business Leaders Shaping the Modern Industry – 2025
PDF
Environmental Law Communication: Strategies for Advocacy (www.kiu.ac.ug)
PPTX
chapter 2 entrepreneurship full lecture ppt
PDF
Keppel_Proposed Divestment of M1 Limited
PDF
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
PDF
THE COMPLETE GUIDE TO BUILDING PASSIVE INCOME ONLINE
PDF
PMB 401-Identification-of-Potential-Biotechnological-Products.pdf
DOCX
Handbook of Entrepreneurship- Chapter 5: Identifying business opportunity.docx
PPT
Lecture notes on Business Research Methods
PDF
ANALYZING THE OPPORTUNITIES OF DIGITAL MARKETING IN BANGLADESH TO PROVIDE AN ...
DOCX
FINALS-BSHhchcuvivicucucucucM-Centro.docx
PPTX
operations management : demand supply ch
PDF
533158074-Saudi-Arabia-Companies-List-Contact.pdf
PPTX
basic introduction to research chapter 1.pptx
PPTX
CTG - Business Update 2Q2025 & 6M2025.pptx
PPTX
Project Management_ SMART Projects Class.pptx
Susan Semmelmann: Enriching the Lives of others through her Talents and Bless...
Lecture 3344;;,,(,(((((((((((((((((((((((
Tortilla Mexican Grill 发射点犯得上发射点发生发射点犯得上发生
1911 Gold Corporate Presentation Aug 2025.pdf
Ron Thomas - Top Influential Business Leaders Shaping the Modern Industry – 2025
Environmental Law Communication: Strategies for Advocacy (www.kiu.ac.ug)
chapter 2 entrepreneurship full lecture ppt
Keppel_Proposed Divestment of M1 Limited
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
THE COMPLETE GUIDE TO BUILDING PASSIVE INCOME ONLINE
PMB 401-Identification-of-Potential-Biotechnological-Products.pdf
Handbook of Entrepreneurship- Chapter 5: Identifying business opportunity.docx
Lecture notes on Business Research Methods
ANALYZING THE OPPORTUNITIES OF DIGITAL MARKETING IN BANGLADESH TO PROVIDE AN ...
FINALS-BSHhchcuvivicucucucucM-Centro.docx
operations management : demand supply ch
533158074-Saudi-Arabia-Companies-List-Contact.pdf
basic introduction to research chapter 1.pptx
CTG - Business Update 2Q2025 & 6M2025.pptx
Project Management_ SMART Projects Class.pptx

Keeping Data Secure in Large Companies

  • 1. By: Michael Wright Cheryl Childers
  • 2. Your company’s value is its data Company’s reputation Company’s liability with sensitive information HIPPA and Privacy Notices
  • 3. • A “security breach” is defined as the unauthorized release of unencrypted or unredacted records or data containing personal information with corresponding names, such as a person’s first initial and last name. The acquisition of encrypted data only is a breach if a confidential process or key needed to unlock the data is also breached.
  • 5. • Bad publicity • Loss of costumers • Loss in profit • Lawsuits • Increased expenses • New security software • More lawsuits • Companies being investigated
  • 6. • Dispose of sensitive information securely • Shred documents • Use document destruction companies • Protect personal accounts properly • Keep passwords private • Assign and maintain access levels among staff • Periodically monitoring and testing the safeguards to be sure they are working effectively • Adjusting your security plan according to the results of testing • Use spam blockers • Background check employees
  • 7. • Change passwords frequently • Pay in cash when able to • Check credit report regularly • Shred important documents • Don’t carry social security card in your wallet
  • 8. • http://www.ncdoj.com/getdoc/c4549c4c-9894-4a61-b801- 48171c01f566/Security-Breach-Information.aspx • http://www.business.ftc.gov/privacy-and-security/data-security

Editor's Notes

  • #3: Add smart art
  • #5: Company pictures