ࡱ> \_[ Ybjbj[[ 4D99w  ttttt84d9XL(Z8888888$:=x8t|||8tt8|Rtt8|8'57PStAv5s8809 6>D`>47>t7-0]"---88---9||||>--------- :: 黨ǿInformation TechnologyIdentity Theft Policy Statement The risk to 黨ǿ, its employees and customers from data loss and identity theft is of significant concern to the University and can be reduced only through the combined efforts of every employee and contractor. 黨ǿ adopts this sensitive information policy to help protect employees, customers, contractors and the University from damages related to the loss or misuse of sensitive information. This policy will: Define sensitive information; Describe the physical security of data when it is printed on paper; Describe the electronic security of data when stored and distributed; and Place the University in compliance with state and federal law regarding identity theft protection. This policy enables 黨ǿ to protect existing customers, reducing risk from identity fraud, and minimize potential damage to the University from fraudulent new accounts. The program will help 黨ǿ: Identify risks that signify potentially fraudulent activity within new or existing covered accounts; Detect risks when they occur in covered accounts; Respond to risks to determine if fraudulent activity has occurred and act if fraud has been attempted or committed; and Update the program periodically, including reviewing the accounts that are covered and the identified risks that are part of the program. Definitions Identify theft means fraud committed or attempted using the identifying information of another person without authority. Sensitive Information includes the following items whether stored in electronic or printed form: Credit card information, including any of the following: Credit card number (in part or whole) Credit card expiration date Cardholder name Cardholder address Tax identification numbers, including: Social Security number Business identification number Employer identification numbers Payroll information, including, among other information: Paychecks Pay stubs Medical information for any employee or customer, including but not limited to: Doctor names and claims Insurance claims Prescriptions Any related personal medical information Other personal information belonging to any customer, employee or contractor, examples of which include: Date of birth Address Phone numbers Maiden name Names Customer number Pin number Marywood personnel are encouraged to use common sense judgment in securing confidential information to the proper extent. If an employee is uncertain of the sensitivity of a particular piece of information, he/she should contact their supervisor. Hard Copy Distribution Each employee and contractor performing work for the University will comply with the following policies: File cabinets, desk drawers, overhead cabinets, and any other storage space containing documents with sensitive information will be locked when not in use. Storage rooms containing documents with sensitive information and record retention areas will be locked at the end of each workday or when unsupervised. Desks, workstations, work areas, printers and fax machines, and common shared work areas will be cleared of all documents containing sensitive information when not in use. Whiteboards, dry-erase boards, writing tablets, etc. in common shared work areas will be erased, removed, or shredded when not in use. When documents containing sensitive information are discarded they will be shredded using a cross cut shredder. Electronic Distribution Each employee and contractor performing work for the University will comply with the following policies: Internally, sensitive information may be transmitted using approved Marywood e-mail. All sensitive information must be encrypted when stored in an electronic format. Any sensitive information sent externally must be encrypted and password protected and only to approved recipients. Additionally, a statement such as this should be included in the e-mail: This message may contain confidential and/or proprietary information and is intended for the person/entity to whom it was originally addressed. Any use by others is strictly prohibited. Resources: Contacts: Questions about this Policy or other campus electronic information resource policies may be directed to Information Technology: projectoffice@marywood.edu Report network security incidents to Information Technology: itsecurity@marywood.edu For 黨ǿ Policies and Procedures:  HYPERLINK "http://www.marywood.edu/policy/" http://www.marywood.edu/policy/ For reports about general computer use violations see "Conditions of Computer Use at:  HYPERLINK "http://www.marywood.edu/policy/detail.html?id=95039&crumbTrail=Conditions%20of%20Computer%20Use&pageTitle=Policies%20and%20Procedures%20Manual:%20Conditions%20of%20Computer%20Use" http://www.marywood.edu/policy/detail.html?id=95039&crumbTrail=Conditions%20of%20Computer%20Use&pageTitle=Policies%20and%20Procedures%20Manual:%20Conditions%20of%20Computer%20Use For National Standards to Protect the Privacy of Personal Health Information (HIPAA):  HYPERLINK "http://www.hhs.gov/ocr/hipaa/" http://www.hhs.gov/ocr/hipaa/ For Family Educational Rights and Privacy Act (FERPA):  HYPERLINK "http://www.ed.gov/policy/gen/guid/fpco/ferpa/index.html" http://www.ed.gov/policy/gen/guid/fpco/ferpa/index.html Related Documents: Policy Security for Administrative Computing User Passwords Policy Conditions of Computer Use Policy Red Flags     Print Date  DATE \@ "MM/dd/yy" 10/10/17 Print Date  DATE \@ "MM/dd/yy" 10/10/17 ,./0>?@ABST5 6 $ % 125JĹ{{odUhdyhd$B*CJaJphhdyhd$CJaJhdyhd$5CJaJhdyhP5CJaJhdyhP5CJaJhPhPB*CJaJphhdyhs[5CJaJhdyhPCJaJhdyhPCJaJ hP5CJ hs[5CJ hs[CJhz^ hz^5CJ( hBH5CJ hz^5CJ hs[5CJ hs[5CJ(-.tc$ !$Ifa$gdz^qkd$$Ifl0$h04 la $ !$Ifa$  !$If./0?q$ !$Ifa$gdf  !$Ifqkd$$Ifl0$h04 la?@ABST6 7   0 1 w & FgdBAgdP$a$qkdX$$Ifl0$h04 la 1 u v $ % p q   45 7$8$H$^gdd$ & F7$8$H$gdBA 7$8$H$gdP$a$gdP & FgdBA)*>?gh^gddy`gddy & F7$8$H$^gdBA & F7$8$H$^gdBA 7$8$H$gdd$ 7$8$H$^gdd$ghef89vgggh-Eh-EB*CJaJphhdyh-EOJQJ^Jhdyh-EB*CJaJph#hd$hd$5B*CJ\aJph#hdyhd$5B*CJ\aJph hdyhd$B*CJ\aJphhd$hd$OJQJ^Jhdyhd$OJQJ^Jhdyhd$B*CJaJphhd$hd$B*CJaJph'ef89HI & F7$8$H$^gdBA 7$8$H$^gdd$ & F7$8$H$^gdBA 7$8$H$`gddy 7$8$H$gdd$ & F7$8$H$gdBA^gdd$ & FgdBAIRSbcpqxy & FgdBA h7$8$H$^hgd-E 7$8$H$gddy 7$8$H$gd-E 7$8$H$gdd$gdd$ 7$8$H$^gdd$ & F7$8$H$^gdBAMN|}%&gddy & F 7$8$H$gdBA & F gdBA 7$8$H$gddy h7$8$H$^hgd-E 7$8$H$gd-E & F7$8$H$gdBAgd-EGQ{|}%W̡̮̮̽̽saQaQFhdyhdyCJaJhdyhdyCJaJmHnHu"hdyhdy5CJaJmHnHuhdyhd$B*CJaJph#hdyh-E6B*CJ]aJphhdyh-EOJQJ^Jh-Eh-EOJQJ^Jhdyh-EB*CJaJphhdyhdyB*CJaJphh-Eh-EB*CJaJph#h-Eh-E5B*CJ\aJph#hdyh-E5B*CJ\aJphVW./VWjk 7$8$H$gddy & F gdBAgdd^gdd^gddy`gddygddy   ,-./fDFGMQRS~{ncZII jhdyhdy5CJUaJhSz5CJaJhy<hdCJaJh#hd0JCJaJhdhdCJaJhdCJaJjhdCJUaJhdyhdyB*CJaJphhdyhdy5CJaJhdyhdyCJaJhdyhSzCJaJhdyCJaJh#hSz0JCJaJhSzhSzCJaJhSzCJaJjhSzCJUaJTUVWhɼphdhdhdhd`X`XOXhErmHnHujh rJUh rJhHjhHUhd$hdyB*CJaJphhdyhdyCJaJmHnHuhdyhdyB*CJaJphhdyhdy0JCJaJ!jhdyhdy0JCJUaJhdyhdy0JCJaJhdyhdyCJaJhdyhdy5CJaJ jhdyhdy5CJUaJhdyhdy0J5CJaJ $$Ifa$ $$Ifa$$If !"NO}{ul $$Ifa$$Ifkd$$IflF $x x x 0    4 la./CDLMWXYhd$hdyB*CJaJphhHhErmHnHujh rJUh rJ OPQRSTUVWXY 7$8$H$gddyokd$$Ifl40$ $ 04 laf4 2&P:pr/ =!"#$% $$If!vh#vh#v:V l05h5/ / 4$$If!vh#vh#v:V l05h5/ / / /  4$$If!vh#vh#v:V l05h5/ / /  / 4r$$If!vh#vx :V l05x 4$$If!vh#v #v:V l405 54f4^ 02 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH 8`8 Normal_HmH sH tH 8@8  Heading 1$@&CJ<@<  Heading 2$@&5CJR@R dy Heading 3$<@&5CJOJQJ\aJDA`D Default Paragraph FontVi@V  Table Normal :V 44 la (k (No List 4@4 Header  !4 @4 Footer  !RCR Body Text Indent$0^`0a$.)!. Page Number4B24 Body Text$a$8"@8 Caption$a$5CJ boRb Default 7$8$H$-B*CJOJQJ^J_HaJmH phsH tH @W`a@  Strong5B*CJ \^JaJ phJ^@QRJ   Normal (Web) dd B*^JphH@H P Balloon TextCJOJQJ^JaJ@@@ 5d List Paragraph ^JJ dyHeading 3 Char5CJOJQJ\aJ4U@4 dy0 Hyperlink >*ph2O2 dy headerslevel1FVF dFollowedHyperlink >*B*phPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭V$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3N)cbJ uV4(Tn 7_?m-ٛ{UBwznʜ"Z xJZp; {/<P;,)''KQk5qpN8KGbe Sd̛\17 pa>SR! 3K4'+rzQ TTIIvt]Kc⫲K#v5+|D~O@%\w_nN[L9KqgVhn R!y+Un;*&/HrT >>\ t=.Tġ S; Z~!P9giCڧ!# B,;X=ۻ,I2UWV9$lk=Aj;{AP79|s*Y;̠[MCۿhf]o{oY=1kyVV5E8Vk+֜\80X4D)!!?*|fv u"xA@T_q64)kڬuV7 t '%;i9s9x,ڎ-45xd8?ǘd/Y|t &LILJ`& -Gt/PK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!0C)theme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] YD ArtvyY .?1 IOY! ,FR~TYXXXX1:Mbky8@0(  B S  ? _Hlt264446271 _Hlt215972468 _Hlt215972469Z@@@Z ZZ9*urn:schemas-microsoft-com:office:smarttagsplace=*urn:schemas-microsoft-com:office:smarttags PlaceName=*urn:schemas-microsoft-com:office:smarttags PlaceType Ll|WZ TXWWZ333 ##||.//MQ "".MNNPPQRSWZ ##||.//MQWZ 8lu|dl7bQ!Rn$PL<w:I8 @CEL1xO{ZVHEX2 D )t^)`fyB>jh^`OJQJo(hHhp^p`OJQJ^Jo(hHoh@ ^@ `OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHhP^P`OJQJ^Jo(hHoh ^ `OJQJo(hHh ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.h ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH. ^`hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH. ^`hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH. ^`hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.h ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.h ^`hH.h p^p`hH.h @ L^@ `LhH.h ^`hH.h ^`hH.h L^`LhH.h ^`hH.h P^P`hH.h  L^ `LhH.h ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.h ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH. {ZVbQ!`fyD )tn$EXw:I@CELd8                                                                                           32PPDJ 5di}Erd.")#E#d$2z-+62oC-E rJpSTNX X]z^P_?tdydyy~}]xf,* $,r\Sz[fOs[BABH#Y!GHPN}P@||||Y@UnknownG*Ax Times New Roman5Symbol3. *Cx Arial7@Cambria5. .[`)Tahoma?= *Cx Courier New;WingdingsA$BCambria Math#h&DSZGf C 'C '24 3QHX ?r2 !xx  Marywood UniversityBurns, Sr. Kathleen4         Oh+'0  4 @ L Xdlt| 黨ǿ Normal.dotmBurns, Sr. Kathleen9Microsoft Office Word@@x] @fQ@@FAC՜.+,D՜.+,< hp  黨ǿ'   Titlep 8@ _PID_HLINKSA(om 8http://www.ed.gov/policy/gen/guid/fpco/ferpa/index.htmlEhttp://www.hhs.gov/ocr/hipaa/70http://www.marywood.edu/policy/detail.html?id=95039&crumbTrail=Conditions%20of%20Computer%20Use&pageTitle=Policies%20and%20Procedures%20Manual:%20Conditions%20of%20Computer%20Use,6 http://www.marywood.edu/policy/  !"$%&'()*,-./0123456789:;<=>?@ABCDEFGHIJLMNOPQRTUVWXYZ]^aRoot Entry FPStA`Data #1Table+H>WordDocument 4DSummaryInformation(KDocumentSummaryInformation8SMsoDataStorePqAPStAFGNMP2GNXS32==2PqAPStAItem  PropertiesUCompObj r   F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q