Time
2 hours 19 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:00
welcome back to student data privacy fundamentals. This lesson is defining your critical incident response.
00:07
In this video, you will learn what is a critical incident and how should you respond.
00:12
How to maintain business continuity during a critical incident.
00:15
What should be included in a disaster recovery plan and what should be included in a data breach response plan
00:23
control show ensure that this the district can recover from any damage to or breach of critical systems, data or information within a reasonable period of time.
00:34
Each school department or individual is required to report any instances immediately to the ice so or designee for response to a system emergency or other occurrence. For example, fire vandalism, system failure, data breach or natural disaster that damages or breaches data or systems,
00:55
document or attention. Business continuity and district board policies delineate the process for data retention for all district data, including backup requirements, the district will maintain systems that provide near line and offsite data backup. These systems shall allow for the full recovery of critical systems. In the event of a disaster,
01:15
you will want to stay how often your organization will complete a backup. For example, the district will test near line and off site backups quarterly.
01:25
The district's Technology disaster recovery plan outlines critical staff responsibilities and processes in the event of a disaster or critical data loss.
01:34
The district shall maintain a list of all critical systems and data, including contact Information
01:41
technology. Disaster Recovery plan shall include processes that enable the district to continue operations and efficiently restore any loss of data in the event of fire vandalism, natural disaster or critical system failure, which we will discuss. In a later lesson on the disaster recovery plan,
02:00
the data breach response plan addresses state law regarding a data breach response.
02:05
The plan enables the district to respond effectively and efficiently toe a data breach involving personally identifiable bull information or PII II,
02:14
confidential or protected information district, identifiable information and other significant cybersecurity incident.
02:21
The data breach response plan shall include processes to validate and contain the security breach. Analyze the breach to determine scope and composition, minimize impact to the users and provide notification
02:35
time for a quiz.
02:37
What are the differences between disaster recovery and a data breach?
02:46
A disaster recovery plan is used in case of a disaster like fire, flood tornado building collapse, etcetera, that could in turn effect data. In this situation, environmental factors may be the biggest threat. A data breach response plan is enacted when confidential data has been accessed without authorization.
03:05
A data breach is often a much more critical incident.
03:07
Then, when a disaster recovery plan is needed
03:12
In today's video, we discussed what is a critical incident and how should you respond?
03:16
How to maintain business continuity during a critical incident,
03:21
what should be included in a disaster recovery plan and what should be included in a data breach response plan.
03:27
This lesson completes module to In the next module, we will begin discussing the supplemental materials you will need for your data governance policy, beginning with defining your terms and federal regulations. See you soon.

Up Next

Student Data Privacy Governance

This training course is an introduction to federal, state, and local laws and regulations safeguarding online data, including FERPA and other student data privacy programs. Students will learn how to create a data governance policy for their organization.

Instructed By

Instructor Profile Image
Ivy Nelson
Instructor