160279 – Ensuring Data Privacy: Global Edition
Ensuring Data Privacy: Global Edition emphasizes the importance of protecting personal and confidential information, and the best practices for doing so.
Employees will learn to identify what constitutes personal and confidential information—including employee, customer, and organizational data—and what behaviors are consistent with respecting individual data privacy rights. Then employees are guided in protecting data in their personal conduct, including when handling data, disposing of data, and working with third parties. This course also presents data privacy best practices with regards to handling portable and electronic devices, managing passwords, and recognizing and addressing phishing attempts. Finally, the course covers how to recognize and respond to data privacy incidents and insider threats, the importance of prompt reporting in light of breach notification and disclosure requirements, and the protection from retaliation for reporting.
This course contains optional content that is specific to the General Data Protection Regulation (GDPR).
Arabic | Chinese Simplified | Dutch | English | French | French Canadian | German | Italian | Japanese | Korean | Brazilian Portuguese | Russian | Spanish Castilian | Spanish Latin American
Key Terms: accidental insiders | availability | business email compromise (BEC) | collecting | company assets | company devices | confidential information | confidentiality | consent | cross-border data transfers | cybersecurity | data minimization | data privacy | data privacy rights | data processing | data processors | data requests | data retention | data security | data subjects | devices | disposal | disposing | electronic devices | equipment | European Union (EU) | General Data Protection Regulation (GDPR) | handling | incidents | individual data privacy rights | information security | insider threat awareness | insider threats | integrity | international data transfers | malicious insiders | malware | multifactor authentication (MFA) | non-retaliation | password management | passwords | personal information (PI) | personally identifiable information (PII) | phishing | phishing attacks | portable devices | processing | public information | red flags | reporting | right of access | right of rectification | right to data portability | right to erasure | right to object | right to restrict processing | sensitive information | social engineering | storing | third parties | withdrawal