Skip to content

Compliance Expert - Privacy and Information Security - Examples

Depending on the context, personal information may need to be protected for confidentiality. Organizations with access to this information need to understand how and when to protect privacy. This course will present some examples from the trenches.

View

COMPLIANCE EXPERT: Privacy & Information Security - The Basics

This training explains how to protect personal information for confidentiality. Organizations with access to this information need to understand how to judge what and when to protect privacy.

View

Compliance Short - Cybersecurity

This training identifies security risks associated with using the company's electronic devices, network, and other IT resources

View

Cybersecurity and Online Habits

This course focuses on common pitfalls in IT security by end users and provides employees with common sense guidelines for managing cybersecurity risks.

View

Cybersecurity Short: Avoiding Phishing Attacks

This short course covers the different types of phishing attempts that you may encounter, how they work, and what you can do to help ensure you don't become a victim to one.

View

Data Protection and Device Security

This course covers a variety of best practices for preventing the loss and theft of company data, as well as protecting the physical devices employees use in their jobs, both at and away from the office.

View

Global Internet, Social Media, and Electronic Communication

This training explores company use of the Internet, social media, and other electronic communication and recommends you be familiar with your company's policy on these resources.

View

Global Privacy and Information Security

This course gives high-level awareness of the regulatory, legal, and corporate requirements for handling and protecting personal information. It explores information security laws and best practices for handling data appropriately.

View
Back To Top