ࡱ> Z\Y BbjbjWW -V55mmm8,$.^$$$$$$$ &(Z$mAA@$2$XR$$:",K"g#ԖwkL # k$$0$#R)%)g#)mg#$$$) : 830. BREACH OF COMPUTERIZED PERSONAL INFORMATION 1. Purpose With the increased reliance upon electronic data, and the maintenance of personal information of students and employees in electronic format, the Joint Operating Committee is concerned about the risk of a breach in the schools electronic system security and the possible disclosure of personal information. This policy addresses the manner in which the school will respond to unauthorized access and acquisition of computerized data that compromises the security and confidentiality of personal information. 2. Authority 73 P.S. Sec. 2301 et seq The Joint Operating Committee directs that administrators shall provide appropriate notification of any computerized system security breach to any state resident whose unencrypted and unredacted personal information was or is reasonably believed to have been accessed or acquired by unauthorized persons. 3. Definitions 73 P.S. Sec. 2302 Breach of the systems security - unauthorized access and acquisition of computerized data that materially compromises the security or confidentiality of personal information maintained by the school as part of the database of personal information regarding multiple individuals and that the school reasonably believes has caused or will cause loss or injury to any state resident. Good faith acquisition of personal information by an employee or agent of the school for the purpose of the school is not a breach of the security of the system if the personal information is not used for a purpose other than the lawful purpose of the school and is not subject to further unauthorized disclosure. Individual - means any natural person, not an entity or company.  73 P.S. Sec. 2302 Personal information - includes an individuals first initial and last name in combination with and linked to any one or more of the following, when not encrypted or redacted: Social security number. Drivers license number or state identification card number issued instead of a drivers license. Financial account number, credit or debit card number, in combination with any required security code, access code or password that would permit access to an individuals financial account.  Pol. 801 Personal information does not include publicly available information that is lawfully made available to the general public from federal, state or local government records.  73 P.S. Sec. 2302 Records - means any material, regardless of its physical form, on which information is recorded or preserved by any means, including written or spoken words, graphically depicted, printed or electromagnetically transmitted. This term does not include publicly available directories containing information that an individual has voluntarily consented to have publicly disseminated or listed, such as name, address or telephone number. 4. Delegation of Responsibility 73 P.S. Sec. 2303 The Executive Director or designee shall ensure that the school provides notice of any system security breach, following discovery, to any state resident whose unencrypted and unredacted personal information was or is reasonably believed to have been accessed and acquired by an unauthorized person. Such notice shall be made without a reasonable delay, except when a law enforcement agency determines and advises the school in writing that the notification would impede a criminal or civil investigation, or the school must take necessary measures to determine the scope of the breach and to restore the reasonable integrity of the data system. The school will also provide notice of the breach if the encrypted information is accessed and acquired in an unencrypted form, if the security breach is linked to a breach of security of the encryption, or if the security breach involves a person with access to the encryption key. References: Breach of Personal Information Notification Act 73 P.S. Sec. 2301 et seq. Fair Credit Reporting Act 15 U.S.C. Sec. 1681a Joint Operating Committee Policy 801      830. BREACH OF COMPUTERIZED PERSONAL INFORMATION - Pg.  PAGE \* MERGEFORMAT 2 Page  PAGE 2 of  NUMPAGES 2  Page  PAGE 1 of  NUMPAGES 2 FAYETTE COUNTY CAREER AND TECHNICAL INSTITUTE No. 830 SECTION: OPERATIONS TITLE: BREACH OF COMPUTERIZED PERSONAL INFORMATION ADOPTED: REVISED:   !568BCD  ( K T @ A B C O P X k l p  ˿ϮϨϕ h~CJ h,VCJ h,V5CJ h (CJ hCJ h|CJ h&CJh&h&CJaJhkihh (h& hN+CJ h sCJhOhkihhOh (hhOh sh hOh s hkiCJ667wnh$If $Ifgd ( $$1$Ifa$tkd$$Ifl  0r h,+  t0  4 la$1$If78CDA B }}wn $Ifgd&$If Z@@$1$Iftkd$$Ifl  0r h,+  t0  4 laB C P Y k l }}}}pp o@@$1$If Z@@$1$Iftkd:$$Ifl  0r h,+  t0  4 la {|}}}}pp o@@$1$If Z@@$1$Iftkd$$Ifl  0r h,+  t0  4 la  1 7 =Dz{|}~ 45⭤ӭ⭞ h/BCJ h9CJ hG,CJ hG,5CJ hCJh!h!CJ h!CJhe"hVCJ hb CJh (hN+5CJ hN+5CJ hN+CJh,Vh,VCJ hkiCJ hCJ h~CJ h,VCJ h (CJ2|}~}m` o@@$1$If o@@$1$IfgdN+ Z@@$1$Iftkdt$$Ifl  0r h,+  t0  4 lazzm]P o@@$1$If o@@$1$IfgdN+ Z@@$1$If Z@@$1$IfgdN+tkd$$Ifl  0r h,+  t0  4 lazfV o@@$1$Ifgd! & F o@@$1$Ifgd ( Z@@$1$IfgdN+tkd$$Ifl  0r h,+  t0  4 la}i\ o@@$1$If & F o@@$1$Ifgd! Z@@$1$IftkdK$$Ifl  0r h,+  t0  4 la  }m o@@$1$IfgdN+ Z@@$1$Iftkd$$Ifl  0r h,+  t0  4 la   }i\ o@@$1$If & F o@@$1$Ifgd! Z@@$1$Iftkd$$Ifl  0r h,+  t0  4 la}}pp o@@$1$If Z@@$1$Iftkd"$$Ifl  0r h,+  t0  4 laLM}}}pp o@@$1$If Z@@$1$Iftkd$$Ifl  0r h,+  t0  4 la)KLMNQno !&- $%&'-34@BCӻӻ߻߫ӡӛ hckCJhsh~5CJhshs5CJ hsCJ h!CJ h"6PCJ h.cCJ hCJ h~CJ hCJ hJCJhG,hVCJ hkiCJ h9CJ hVCJ:MNox%&}}}}pp o@@$1$If Z@@$1$Iftkd\$$Ifl  0r h,+  t0  4 la&'()}p o@@$1$If Z@@$1$Iftkd$$Ifl  0r h,+  t0  4 la)*+,}p o@@$1$If Z@@$1$Iftkd$$Ifl  0r h,+  t0  4 la,-./}p o@@$1$If Z@@$1$Iftkd3 $$Ifl  0r h,+  t0  4 la/012}p o@@$1$If Z@@$1$Iftkd $$Ifl  0r h,+  t0  4 la234@A}m` o@@$1$If o@@$1$Ifgd~ Z@@$1$Iftkdm $$Ifl  0r h,+  t0  4 laABC}mmmmmm o@@$1$Ifgd! Z@@$1$Iftkd $$Ifl  0r h,+  t0  4 la}m o@@$1$IfgdI Z@@$1$Iftkd $$Ifl  0r h,+  t0  4 la}m o@@$1$IfgdI Z@@$1$IftkdD $$Ifl  0r h,+  t0  4 la}m o@@$1$IfgdI Z@@$1$Iftkd $$Ifl  0r h,+  t0  4 la 6<=STUVWXY^_efghlmxyz{|}żssjh?3hkiCJh?3CJaJmHnHujh?3h?3CJUaJh?3h?3CJaJhki hkiCJh?3aJmHnHujh9)hkiUaJh9)hkiaJh9)h9)aJhh9)h9)aJhLjhLUh!hkiCJaJ hckCJhshck5CJ&}m o@@$1$IfgdI Z@@$1$Iftkd~ $$Ifl  0r h,+  t0  4 laWXYzt$1$a$$gd (gd=|1$tkd$$Ifl  0r h,+  t0  4 la Y|})*45>?@AB 1$1$   1$^ gdX1 *$a$gd?3}~(23>?ABƹƹưତ}vpeh!hkiCJaJ hkiCJ hxCJh h (CJh h sCJh hZ rCJh hkiCJhh#yhX1CJ0aJ0h8CJ0aJ0hLh?3hkiCJh?3CJaJmHnHujh?3h?3CJUaJh?3h?3CJaJhkijhkiUmHnHujhX1UmHnHu"+ 0/ =!h"h#P$X% $$If!vh5+ 5 #v+ #v :V l t0  5+ 5 4a$$If!vh5+ 5 #v+ #v :V l t0  5+ 5 4a$$If!vh5+ 5 #v+ #v :V l t0  5+ 5 4a$$If!vh5+ 5 #v+ #v :V l t0  5+ 5 4a$$If!vh5+ 5 #v+ #v :V l t0  5+ 5 4a$$If!vh5+ 5 #v+ #v :V l t0  5+ 5 4a$$If!vh5+ 5 #v+ #v :V l t0  5+ 5 4a$$If!vh5+ 5 #v+ #v :V l t0  5+ 5 4a$$If!vh5+ 5 #v+ #v :V l t0  5+ 5 4a$$If!vh5+ 5 #v+ #v :V l t0  5+ 5 4a$$If!vh5+ 5 #v+ #v :V l t0  5+ 5 4a$$If!vh5+ 5 #v+ #v :V l t0  5+ 5 4a$$If!vh5+ 5 #v+ #v :V l t0  5+ 5 4a$$If!vh5+ 5 #v+ #v :V l t0  5+ 5 4a$$If!vh5+ 5 #v+ #v :V l t0  5+ 5 4a$$If!vh5+ 5 #v+ #v :V l t0  5+ 5 4a$$If!vh5+ 5 #v+ #v :V l t0  5+ 5 4a$$If!vh5+ 5 #v+ #v :V l t0  5+ 5 4a$$If!vh5+ 5 #v+ #v :V l t0  5+ 5 4a$$If!vh5+ 5 #v+ #v :V l t0  5+ 5 4a$$If!vh5+ 5 #v+ #v :V l t0  5+ 5 4a$$If!vh5+ 5 #v+ #v :V l t0  5+ 5 4a$$If!vh5+ 5 #v+ #v :V l t0  5+ 5 4a$$If!vh5+ 5 #v+ #v :V l t0  5+ 5 4a^ 2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH 8`8 Normal_HmH sH tH B@B  Heading 1$$1$@&a$CJF@F  Heading 2$1$@& o@@CJDA`D Default Paragraph FontVi@V  Table Normal :V 44 la (k (No List 4@4 Header  !4 @4 Footer  !HH Z' Balloon TextCJOJQJ^JaJPK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] /B/BV aa }B &*7B | M&),/2AYB !"#$%'()D[]fmot!!!@  @ 0(  B S  ?F.( ( P t  c $#" ? z  s *#" ? +K 5(,@ 5gjCC88;;BCDD(XXjkp=D} & - ''-BC6<VY^hl{}~(23@C88;;BCDD((XXjkDD} - - ''-BCY^hl}~C1Uܚ0viFBhh^h`56o(hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.hh^h`56o(hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.1Uviܫ                ;:u.m >.ckib xZ'e" (9)N+G,SV2?3F\8Q+;/BJ>E"6P,VTZck7?la.nZ rXt|=|9OVIs a:&JXX17L!mtZ} s~8v@@B@UnknownG* Times New Roman5Symbol3. * Arial5. .[`)TahomaA$BCambria Math"qhJc&lr6b b !r4d 3qHX?Z r2!xx001Luchino Castagnoflood  Oh+'0t  $ 0 < HT\dl001Luchino CastagnoNormalflood28Microsoft Office Word@0@,B@@8Wkb ՜.+,0 hp|  NSR 001 Title  !"#$%&'()*+-./012356789:;<=>?@ABCDEFGHJKLMNOPRSTUVWX[Root Entry Fwk]Data ,1Table4)WordDocument-VSummaryInformation(IDocumentSummaryInformation8QCompObjy  F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89q