161179 – Intelligent Recertification – Ensuring Data Privacy: Global Edition
Intelligent Recertification (IR) flips the traditional course construct on its head.
This approach gives learners who had foundational training in prior years exactly the content they need and rewards them by fast-tracking them through the course based on their performance in simulation. Rather than employees receiving content up front and then entering into learn-by doing simulation, employees are immersed directly into simulation.
As employees demonstrate knowledge, they’ll move through scenarios without required content. If they make the incorrect choice in simulation, they are provided with the content relevant to the concept they missed and are given an alternate, equivalent scenario to demonstrate their understanding and achieve proficiency.
Arabic | Chinese Simplified | Dutch | English | French | French Canadian | German | Italian | Japanese | Korean | Brazilian Portuguese | Russian | Spanish Castilian | Spanish Latin American
Key Terms: availability | business email compromise (BEC) | collecting | company assets | company devices | confidential information | confidentiality | consent | cybersecurity | data minimization | data privacy | data privacy rights | data processing | data processors | data requests | data retention | data security | data subjects | devices | disposal | disposing | electronic devices | equipment | European Union (EU) | General Data Protection Regulation (GDPR) | handling | incidents | individual data privacy rights | information security | insider threat awareness | insider threats | integrity | malicious insiders | malware | non-retaliation | password management | passwords | personal information (PI) | personally identifiable information (PII) | phishing | phishing attacks | portable devices | processing | public information | red flags | reporting | right of access | right of rectification | right to data portability | right to erasure | right to object | right to restrict processing | sensitive information | social engineering | storing | third parties | withdrawal