160178 – Ensuring Data Privacy: US Edition
Ensuring Data Privacy: US Edition emphasizes the importance of protecting personal and confidential information, and the best practices for doing so.
Employees will learn to identify what constitutes personal and confidential information—including employee, customer, and organizational data—and what behaviors are consistent with respecting individual data privacy rights. This course also presents data privacy best practices with regards to handling portable and electronic devices, managing passwords, and recognizing and addressing phishing attempts. The course covers the data privacy risks associated with working with third parties, and how to mitigate the risks of careless disclosure by taking precautions with their personal conduct. Finally, the course covers how to recognize and respond to data privacy incidents, the importance of prompt reporting in light of breach notification and disclosure requirements, and the protection from retaliation for reporting.
This course has optional CCPA-specific information that can be added if the client wishes. The demo on this page includes the CCPA content so clients can review, but the default course is US only.
This course utilizes an immersive Crack the Code framework to enhance learner engagement.
Arabic | Chinese Simplified | Dutch | English | French | French Canadian | German | Italian | Japanese | Korean | Brazilian Portuguese | Russian | Spanish Castilian | Spanish Latin American
Key Terms: availability | business email compromise (BEC) | California Consumer Privacy Act (CCPA) | California Privacy Rights Act (CPRA) | collecting | company assets | company devices | confidential information | confidentiality | cybersecurity | data minimization | data privacy | data privacy rights | data processing | data processors | data requests | data retention | data security | devices | disposal | disposing | electronic devices | equipment | handling | incidents | individual data privacy rights | information security | insider threat awareness | insider threats | integrity | malicious insiders | malware | non-retaliation | password management | passwords | personal information (PI) | personally identifiable information (PII) | phishing | phishing attacks | portable devices | processing | public information | red flags | reporting | right to access | right to correct | right to data portability | right to delete | right to know | right to non-discrimination | right to opt out | sensitive information | social engineering | storing | third parties