161178 – Intelligent Recertification – Ensuring Data Privacy: US Edition
Intelligent Recertification (IR) flips the traditional course construct on its head.
This approach gives learners who had foundational training in prior years exactly the content they need and rewards them by fast-tracking them through the course based on their performance in simulation. Rather than employees receiving content up front and then entering into learn-by doing simulation, employees are immersed directly into simulation.
As employees demonstrate knowledge, they’ll move through scenarios without required content. If they make the incorrect choice in simulation, they are provided with the content relevant to the concept they missed and are given an alternate, equivalent scenario to demonstrate their understanding and achieve proficiency.
Arabic | Chinese Simplified | Dutch | English | French | French Canadian | German | Italian | Japanese | Korean | Brazilian Portuguese | Russian | Spanish Castilian | Spanish Latin American
Key Terms: availability | business email compromise (BEC) | California Consumer Privacy Act (CCPA) | California Privacy Rights Act (CPRA) | collecting | company assets | company devices | confidential information | confidentiality | cybersecurity | data minimization | data privacy | data privacy rights | data processing | data processors | data requests | data retention | data security | devices | disposal | disposing | electronic devices | equipment | handling | incidents | individual data privacy rights | information security | insider threat awareness | insider threats | integrity | malicious insiders | malware | non-retaliation | password management | passwords | personal information (PI) | personally identifiable information (PII) | phishing | phishing attacks | portable devices | processing | public information | red flags | reporting | right to access | right to correct | right to data portability | right to delete | right to know | right to non-discrimination | right to opt out | sensitive information | social engineering | storing | third parties