<html><head></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; "><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Helvetica; min-height: 17px; "><img id="b1946a14-03d2-4886-bfa6-9f67a3f8d9fc" height="80" width="640" apple-width="yes" apple-height="yes" src="cid:C0D2A49B-C6B2-4DC0-BD35-D2BE5B1968F0@mit.edu"></div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Helvetica; min-height: 17px; "><br></div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Helvetica; ">October is National Cyber Security Awareness Month, an annual campaign to highlight what each of us can do to protect our computers, data and privacy. </div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Helvetica; min-height: 17px; "><br></div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Helvetica; ">This email is the third in a series of weekly tips. We hope they will be useful to you!</div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Helvetica; min-height: 17px; "><br></div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Helvetica; "><b>Tip of the Week: Protecting Institute Data</b></div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Helvetica; min-height: 17px; "><br></div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Helvetica; ">Just as anyone working with chemicals needs to know about special handling requirements, those who are handling certain data are required to do the same. </div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Helvetica; min-height: 17px; "><br></div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Helvetica; ">Massachusetts law now states that if you handle personal information (e.g. social security number (SSN), driver's license number, or credit card or bank number), you are expected to protect it from unauthorized access. If there is a data compromise, MIT has a responsibility to notify the affected individuals. The new term PIRN (Personal Information Requiring Notification) was introduced to highlight this responsibility. </div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Helvetica; min-height: 17px; "><br></div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Helvetica; ">Whether you handle PIRN on a regular basis or infrequently, you need to understand your role in protecting it. MIT's Written Information Security Program (<a href="http://web.mit.edu/infoprotect/wisp.html">http://web.mit.edu/infoprotect/wisp.html</a>) outlines these expectations and provides guidance.</div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Helvetica; min-height: 17px; "><br></div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Helvetica; ">MIT provides technical and procedural resources at <a href="http://web.mit.edu/infoprotect/resources/">http://web.mit.edu/infoprotect/resources/</a> to help you:</div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Helvetica; min-height: 17px; "><br></div>
<ul style="list-style-type: disc">
<li style="margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Find out if you have PIRN on your computer;</li>
<li style="margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Encrypt information you need to keep when stored on laptops or other mobile devices;</li>
<li style="margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Thoroughly wipe the data from old computers that are to be repurposed.</li>
</ul><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Helvetica; min-height: 17px; "><br></div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Helvetica; ">If you need help with computer security settings, contact the IS&T Service Desk at 617-253-1101 or <a href="mailto:helpdesk@mit.edu">helpdesk@mit.edu</a>. For self-help, search the articles in Hermes, the IS&T knowledge base (<a href="http://kb.mit.edu">http://kb.mit.edu</a>).</div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Helvetica; min-height: 17px; "><br></div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Arial; ">More tips and resources can be found on IS&T's Security website (<a href="http://ist.mit.edu/security"><span style="text-decoration: underline ; color: #134fae">http://ist.mit.edu/security</span></a>).</div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Arial; min-height: 16px; "><br></div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Arial; ">This campaign is supported by the IT Security Systems & Services Team at MIT. Please contact us at <a href="mailto:security@mit.edu"><span style="text-decoration: underline ; color: #134fae">security@mit.edu</span></a> if you have any questions, comments, or would like us to give a presentation to your department or group.</div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Arial; min-height: 16px; "><br></div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Arial; ">If you have a concern about sensitive data, or believe there may have been a data breach, contact <a href="mailto:infoprotect@mit.edu">infoprotect@mit.edu</a>.</div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 14px/normal Helvetica; min-height: 17px; "><br></div><div><span class="Apple-style-span" style="font-family: Calibri; font-size: 14px; "><div style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; "><div><div><font class="Apple-style-span" face="'Lucida Grande'"><span class="Apple-style-span" style="font-size: medium;"><br></span></font><div>Monique Yeaton</div><div>IT Security Awareness Consultant</div><div>MIT Information Services & Technology (IS&T)</div><div>(617) 253-2715</div><div><a href="http://ist.mit.edu/security">http://ist.mit.edu/security</a></div><div><br></div><br></div></div><br></div></span><br class="Apple-interchange-newline"><br class="Apple-interchange-newline">
</div>
<br></body></html>