Schedule Demo
FEATURE OVERVIEW

Get complete visibility of your colleagues’ Data Privacy & Cybersecurity awareness

Data Privacy & Cybersecurity Training & Awareness

Data Privacy & Cybersecurity Training & Awareness

Create and manage training courses using our comprehensive and flexible Learning Management System (LMS). Our LMS covers all your data privacy & cybersecurity training needs, and tracks progress to evaluate awareness and engagement across your entire organisation.

Create and manage training courses using our comprehensive and flexible Learning Management System (LMS). Our LMS covers all your data privacy & cybersecurity training needs, and tracks progress to evaluate awareness and engagement across your entire organisation.
Training1

Consistent and engaging content

Consistent and engaging content

Staff and stakeholder awareness training should be seen as more than simply a tick the box exercise. For organisations to embed a culture of data privacy compliance, the right training processes need to be put in place.

Staff and stakeholder awareness training should be seen as more than simply a tick the box exercise. For organisations to embed a culture of data privacy compliance, the right training processes need to be put in place.
Training2

Instill a culture of compliance

Instill a culture of compliance

Build a data privacy-awareness culture across your organisation for ongoing compliance. Reduce your risk of fines and bad publicity. If your staff are trained, mistakes are less likely to happen.

Build a data privacy-awareness culture across your organisation for ongoing compliance. Reduce your risk of fines and bad publicity. If your staff are trained, mistakes are less likely to happen.
Training3
Training1
Training2
Training3
DEDICATED TRAINING
Courses

Cyber Security at home

GDPR Staff Awareness

California Consumer Privacy Act

12 Steps to GDPR Compliance

Cyber Security Awareness

NINJIO

COURSE

Cyber Security at home

Cyber Security at home

This course provides an overview of the main requirements of GDPR for organisations. It begins by explaining what types of data needs to be protected under the regulation, then details the roles and responsibilities of the Data Controller and the Data Processor. Subsequent modules cover the key principles of Lawfulness and Accountability, as well as the individual rights of staff, customers and the general public guaranteed by GDPR. The final section introduces some practical precautions every staff member can take, and outlines a procedure to follow in the event of a data breach. This course is suitable for all employees as part of your overall GDPR training and awareness activities.
 

Module & Course Breakdown

13 Modules 1 Hour 16 Minutes Total Length

Importance Of Cyber Security

Module 17 Min7 Min

The aim of this course is to provide learners with easy-to-understand concepts that help to explore practical cyber security in the home and on-the-move.
Authentication Factors And Importance Of Password

Module 27 Min7 Min

Multi-factor authentication (MFA) is a method of login verification where at least two different factors of proof are required – it provides an extra layer of security.
Safeguarding Emails

Module 33 Min3 Min

Learn how hackers use phishing and spam emails with forged sender addresses, numbers and contact details to look legitimate.
Securing your Smartphone

Module 44 Min4 Min

Many neglect smartphone security, but with so much sensitive data on it, this module provides an understanding on what you should do to keep it safe.
Virtual Private Networks (VPNs)

Module 57 Min7 Min

In the online world, your data is likely to be out in the open and can be accessed by any interested party. Let’s look at why we have to be cautious about free VPN apps.
The Internet Of Things (IOT)

Module 65 Min5 Min

Consumers need to be aware of the dangers of IoT systems and the steps they can take to stay secure such as updating default credentials and applying software updates.
Staying Safe on Social Media

Module 74 Min4 Min

Educate your staff on best practices when it comes to social media. Ensure the safeguards are in place to protect privacy settings and personal data which can be easily accessed by cyber criminals.
Let's Go Online Shopping!

Module 85 Min5 Min

Understand the best practices for online security in order to protect yourself when it comes to your online shopping habits.
Phishing

Module 95 Min5 Min

You should beware of Phishing Strategies, which are methods to trick you into giving confidential information, used to gain access to financial accounts or steal your identity.
Ransomware

Module 108 Min8 Min

Educate your staff on how to be expert defenders against cyberthreats. Mitigate the likelihood of malicious software encrypting files on your computer.
Safeguarding Wi-Fi Networks

Module 119 Min9 Min

Securing the home network should be a top priority for all of us interested in keeping data safe and secure.
Safeguarding Smart TVs

Module 121 Min1 Min

Like any device that regularly connects to the internet, smart TVs bring with them a variety of privacy and security concerns.
Some Extra Tips

Module 131 Min1 Min

Get some extra practical cyber security tips to enhance your education.
COURSE

GDPR Staff Awareness

GDPR Staff Awareness

This course provides you and your staff with key facts about the General Data Protection Regulation. More importantly, it also provides your company with a complete online audit trail, so you know who has completed the training and passed the test.

Module & Course Breakdown

4 Modules 1 Hour 16 Minutes Total Length

Overview

Module 19 Min9 Min

This course will give you an overview of why data protection laws are needed in today’s world. We’ll then outline the purpose of the General Data Protection Regulation, and cover a timeline for its introduction throughout the European Union.
GDPR Principles

Module 28 Min8 Min

This module will take a closer look at the regulation's underlining principles of lawfulness and accountability.
Data Subject Rights

Module 34 Min4 Min

In this module, we’ll take a closer look at your guaranteed rights as a staff member and private citizen under the GDPR. These include, the right to be informed, the right of access, right to rectification, right to erasure, right to restrict processing, right to data portability and the right to object.
Responsibilities

Module 44 Min4 Min

The final module we will be going through some precautions you can take to help keep your personal data safe while at work. We’ll then finish with a brief overview on how to report a data breach.
COURSE

California Consumer Privacy Act

California Consumer Privacy Act

The CCPA was passed in June 2018 by California legislators and has gone into effect since January 1, 2020. However, an amendment has been passed, introducing a 6-month enforcement grace period to July 1, 2020. This means that the Attorney General of California can't start enforcement actions until July of 2020.

CCPA is often called "California's Mini-GDPR". However, there are distinct differences between the two legislations.

CCPA is considered to be the most exhaustive privacy law in the USA. It provides California residents specific enumerated rights and it has far-reaching national and global implications for businesses.

This course will explain CCPA in layman's terms, helping you prepare your business to comply with the law. This course can be taken by anyone with any level of privacy knowledge or experience.

COURSE

12 Steps to GDPR Compliance

12 Steps to GDPR Compliance

It is recommended that organisations become fully compliant with General Data Protection Regulation through a twelve-step process. This course offers a detailed breakdown of how to complete each of these steps. 

Module & Course Breakdown

12 Modules 1 Hour 16 Minutes Total Length1 Hour 16 Minutes Total Length

Awareness

Module 119 Min19 Min

In this module you will learn how to ensure that key decision makers in your organisation are aware of what GDPR entails, and can appreciate its impact on the business.
Information you Hold

Module 219 Min19 Min

In the second module, you will learn how to assess what information you hold and what your record keeping requirements are.
Communicating Privacy Information

Module 313 min13 min

This module will provide an understanding on how to communicate privacy information to data subjects.
Individual Rights

Module 49 Min9 Min

Enhance your knowledge of the key rights individuals have in relation to their data and what your organisation needs to do to remain compliant.
Subject Access Requests

Module 521 Min21 Min

In this module, you will learn about how to deal with subject access requests. Looking at some practical ideas your organisation can put in place to deal with these requests quickly and efficiently.
Lawfulness

Module 631 min31 min

In this module, you will learn how to apply the principle of lawfulness to processing personal data.
Consent

Module 722 min22 min

In this module, you will learn how to obtain consent from individuals for processing standard, high risk and sensitive personal data.
GDPR & Children

Module 86 Min6 Min

Learn about the GDPR’s special considerations for children and some practical compliance issues that revolve around this.
What is a Data Breach?

Module 913 min13 min

Gain an understanding of what a data breach is as well as the obligations and duties that come with it. Learn how to develop policies and procedures for managing the process effectively.
Data Protection by Design and Default

Module 1017 min17 min

In this module, we’ll first cover the key principles that underpin "data protection by design and by default". Providing knowledge on when a DPIA is required and how to conduct the process.
The Data Protection Officer

Module 1110 min10 min

In this module, you will learn all about the Data Protection Officer, or DPO. After covering their role in detail, we’ll cover the factors that will help you decide whether your organisation needs to appoint one.
Cross Border Processing

Module 1223 min23 min

In the final module, you will learn how to navigate situations where you process data in more than one EEA Member State. We’ll also explain the rules on transfers of personal data outside of the EEA, which are broadly the same as under the current regime.
COURSE

Cyber Security Awareness

Cyber Security Awareness

This module covers basic Cyber Security awareness training and best practices to protect your organisation from common emerging cyber threats. 

Module & Course Breakdown

6 Modules 1 Hour 16 Minutes Total Length1 Hour 16 Minutes Total Length

Introduction to Cyber Security

Module 17 Min7 Min

In this module you will learn why cyber security is such an important topic in today’s workplace, and how you could be a potential target for hackers.
Introduction to Malware

Module 29 Min9 Min

In this module, we’ll cover the different types of malware, and how they can affect your computer, devices and workplace.
Internet Acceptable Use

Module 34 Min4 Min

In this module we’ll cover examples of policies your employer is likely to have on using the internet at work, performing tasks online, and sending and receiving emails.
Information Security

Module 44 Min4 Min

In this module, we will examine the rules for storing and classifying data. Identifying procedure awareness which will be critical to helping your organisation protect itself against leaks.
Device Security

Module 54 Min4 Min

In this module we will now cover guidelines for keeping your mobiles, tablets, laptops and home networks safe from malware and breaches. We’ll then briefly take a look at social engineering, and learn what tell tale signs to watch out for at work and on social media.
Legislation and Regulation

Module 61 min1 min

In this module we’ll take an overview of the UK’s Data Protection Act, and the EU’S General Data Protection Regulation. Both sets of legal requirements are the guiding lights on what information should be protected at all times from insider leaks and cyber attacks.
COURSE

NINJIO

NINJIO

We have partnered with cybersecurity awareness training solution provider NINJIO to offer all PrivacyEngine customers their 3 to 4 minute Hollywood-style micro-learning videos to empower individuals and organisations to become defenders against cyberthreats.

Preview Episode4 Minutes

Revolutionary cybersecurity training

We produce 3 to 4 minute micro-learning episodes that educate your users on the latest threats and breaches. NINJIO releases a new episode every month, which keeps your team up to date and alert to cyberthreats.

Every episode is based on a real company that has suffered a significant breach. We focus on a single attack per episode so we don’t overwhelm your employees with technical terms.

security

We produce 3 to 4 minute micro-learning episodes that educate your users on the latest threats and breaches. NINJIO releases a new episode every month, which keeps your team up to date and alert to cyberthreats.

Every episode is based on a real company that has suffered a significant breach. We focus on a single attack per episode so we don’t overwhelm your employees with technical terms.

Preview Episode4 Minutes

What Separates us from traditional training

We connect with your users on an emotional level in the first scene of every episode. This keeps them engaged until the very end, increasing retention and ultimately leading to fewer breaches.

NINJIO’s core philosophy is “no more boring lectures.” Unlike most security awareness training, which is simply a “check-the-box” exercise, we want users to be engaged and have fun while they’re learning about today’s biggest cybersecurity threats

security

We connect with your users on an emotional level in the first scene of every episode. This keeps them engaged until the very end, increasing retention and ultimately leading to fewer breaches.

NINJIO’s core philosophy is “no more boring lectures.” Unlike most security awareness training, which is simply a “check-the-box” exercise, we want users to be engaged and have fun while they’re learning about today’s biggest cybersecurity threats

Red_Dots _ tower  banner
Ninjio
ninjio-logo
Red_Dots _ tower  banner
Ninjio

Game changing cybersecurity training

We empower individuals and organizations to become defenders against cyberthreats, which makes them the first line of defense against today’s increasingly sophisticated cybercriminals.

“PrivacyEngine™ offers a powerful suite of tools that every Data Controller should have access to. I’m using PrivacyEngine™ to manage the entire Data Processor and Controller process both internally and externally for our business.”
Carolyn Keogh
/
General Manager,Mail Metrics
General Manager,Mail Metrics
Dots
Trusted by hundreds of businesses worldwide
Schedule Demo
saab
saab
hush
hush
jones oil
jones oil
seal
seal
corintha
corintha

DISCOVER ALL OUR FEATURES

Stay on top of your privacy programme

Privacy Management

Ω_FA+svg+–+unconfirmed_website_data+retention-1

Records of Processing Activities

Easily create and maintain your Record of Processing Activities

Risk Management

Risk Management

Manage & mitigate your Data Privacy Risks to prevent breaches

Data Protection Impact Assessment

Data Protection Impact Assessment

Identify and mitigate against data protection risks arising from projects.

Data Retention

Data Retention

Accurately decide how long you can keep data and records.

Data Subjects Rights Log

Data Subjects Rights Log

Register & manage all subject access (and other) requests.

Ω_FA+svg+–+unconfirmed_website_data+retention (2)

Data Breach Management

Register data breaches & incidents and manage the process involved.

Ω_FA+svg+–+unconfirmed_website_data+retention (1)

Third Party Assessment

Mitigate risks which may be associated with 3rd party vendors

Support

Support

Dedicated consulting support from our expert team across all pricing plans.

Training & Awareness

Ω_FA+svg+–+unconfirmed_website_data+retention (3)

PrivacyPulse

The latest Privacy & Cybersecurity news in one easy to use feed

Square-dots
Dots
saab
seal
hush
jones-oil
hush
seal
coreintha