160179 – Ensuring Data Privacy: Global Edition
Data Privacy: Global Edition emphasizes the importance of protecting personal and confidential information and the best practices for doing so.
Employees will learn to identify what constitutes personal and confidential information—including employee, customer, and organizational data—and what behaviors are consistent with respecting individual data privacy rights. This course also presents data privacy best practices with regards to handling portable and electronic devices, managing passwords, and recognizing and addressing phishing attempts. Employees are taught about the data privacy risks associated with working with third parties, and how to mitigate the risks of careless disclosure by taking precautions with their personal conduct. Finally, the course covers how to recognize and respond to data privacy incidents, the importance of prompt reporting in light of breach notification and disclosure requirements, and the protection from retaliation for reporting.
This course contains optional content that is specific to the General Data Protection Regulation (GDPR). This content can be removed.
This course utilizes an immersive Crack the Code framework to enhance learner engagement.
Arabic | Chinese Simplified | Dutch | English | French | French Canadian | German | Italian | Japanese | Korean | Brazilian Portuguese | Russian | Spanish Castilian | Spanish Latin American
Key Terms: availability | business email compromise (BEC) | collecting | company assets | company devices | confidential information | confidentiality | consent | cybersecurity | data minimization | data privacy | data privacy rights | data processing | data processors | data requests | data retention | data security | data subjects | devices | disposal | disposing | electronic devices | equipment | European Union (EU) | General Data Protection Regulation (GDPR) | handling | incidents | individual data privacy rights | information security | insider threat awareness | insider threats | integrity | malicious insiders | malware | non-retaliation | password management | passwords | personal information (PI) | personally identifiable information (PII) | phishing | phishing attacks | portable devices | processing | public information | red flags | reporting | right of access | right of rectification | right to data portability | right to erasure | right to object | right to restrict processing | sensitive information | social engineering | storing | third parties | withdrawal