In This Section

Security Information

Published on Aug 27, 2019 · Last Updated 10 months 3 weeks ago
AddtoAny
Share:

WATCH THIS PAGE

Subscribe to be notified of changes or updates to this page.

2 + 8 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.

Service Delivery Items

  • Security Training, Education, and Workshops (workgroup, lab group or Enterprise group)
  • HIPAA Compliance
  • FISMA Compliance
  • Security Risk Assessment
  • Security Contract requirements review
  • Strategic Initiatives
  • PCI Scans/Vulnerability Management/ Hardening Advisement
  • Regulation Assessments
  • Application Security Assessments
  • Policy & Procedures
  • Integration with Research Offices

Information Security Tips

  • Do not send confidential information on unsecure networks such as email, instant messages, or text messages.
  • Use OneDrive for a more secure way to share sensitive information.
  • Our secure e-mail solution provides a method for CHOP e-mail users to send sensitive information to recipients outside the organization in a secure and confidential manner.
  • Use [SEND SECURE] in the subject line of an email message in order to create an encrypted message for all recipients outside the Hospital e-mail system.

Resources:

Use Portable Devices with Care

  • Do not put any unknown flash (or USB) drive into your computer as you could infect your company network with malware.
  • Do not open files that are not familiar from portable devices. 
  • Encrypt all data on laptops, flash drives, and other portable CHOP devices.
  • Eliminate PHI and PII:

Purge all sensitive data (SSNs, credit card information, patient information, etc.) from your computer unless authorized to store locally.

Work Space Protection

  • Log off or Lock systems when you leave them unattended.
  • Do not use another person’s account, identity, or password.
  • Do not connect unauthorized hardware to the CHOP network.
  • Do not download unauthorized applications to your CHOP workstation.
  • Report Lost or Stolen CHOP device immediately to the IS Service Desk- 215-590-4357 or (Ext. 4-HELP)
  • Don’t be tricked into downloading malicious software:

Stop and think before you open attachments or click links in unusual e-mail, text, or instant messages (IM), on social networks, or in random pop-up windows. If you’re unsure if a message is legitimate contact the IS Service Desk.

RIS HITS Recording : Digital & Technology Services Information Security 2023

Log in to view the recorded webinar hosted by Research Information Services Outreach Services and learn about important Information Security information for the CHOP Research Institute.

 

 

Related Services

This service allows you to change your Active Directory password.

Get remote access to the CHOP network as a CHOP employee.

 

 

Related Announcements

Announcements
We all have a role to play in CHOP’s cyberdefense – and we all have a responsibility to take action.
Announcements
The CHOP Technology Governance Committee, in collaboration with the CHOP Cloud Working Group, has released standards to guide cloud usage.
Announcements
Developing or working with someone developing software at CHOP? Then you need to know about the Software Development Security Policy.