Create and manage training courses using our comprehensive and flexible Learning Management System (LMS).
Get complete visibility of your colleagues’ data protection awareness. Create and manage training courses using our comprehensive and flexible Learning Management System (LMS). Select from a library of online training material and assign training to employees to ensure they are fully trained up.
In addition, you can access premium third-party stakeholder awareness training and get your data privacy qualifications internationally recognised on the PrivacyEngine platform.
Certain modules are localised in English, German, Polish, Swedish, Spanish, Russian and Dutch, as well as having Internationalised and US localised versions.
This on-demand training course with our Chief Privacy Officer, Hugh Jones will provide registrants with the basic overview of General Data Protection Regulation (GDPR) and outline pragmatic suggestions on organisational, technological and procedural solutions to achieve compliance with this Regulation. You can Access the primer by clicking here.
Module 1 - Importance Of Cyber Security: In this module we will show how a growing dependence on technology – whether it’s at home, work or school – demands greater security online. You'll also learn the technical terms you should be aware of in the cyber world!
Module 2 - Authentication Factors And Importance Of Password: Multi-factor authentication (MFA) is a method of login verification where at least two different factors of proof are required – it provides an extra layer of security. You will learn about types of authentication factors and everything you need to know about passwords.
Module 3 - Safeguarding Emails: Your email account is an important part of your identity in the cyber world. It is the place where we store important work or home-related data. It also stores conversations with loved ones to documents and personal information. In this module you will learn about how to make your email secure from hackers.
Module 4 - Securing your Smartphone: Many neglect smartphone security, but with so much sensitive data on it, you should do everything you can to keep it safe. In this module you will learn tips on keeping your smart phone safe.
Module 5 - Virtual Private Networks(VPNs): In the online world, your data is likely to be out in the open and can be accessed by any interested party. If that data involves online banking, business email, or any other sensitive data, you should ensure that it is secure. It is under this context that Virtual Private Networks (VPNs) come in to play. In this module, you will learn of the benefits of using a VPN as well as how to use one.
Module 6 - The Internet Of Things(IOT): The IoT is rapidly transforming almost every aspect of modern life. The technology promises smart products for everyone! A major drawback is that many smart devices have a fraction of the security features of your iPhone or Android phone. In this module you will learn how you can protect your IOT systems and devices.
Module 7 - Staying Safe on Social Media: Whilst social media sites are a great way to stay connected, they can also make personal data public. They have incredible reach, so if you aren't careful with your privacy settings, personal data can be easily accessed by cyber criminals. In this module, you will learn about how to keep your social media networks safe.
Module 8 - Let's Go Online Shopping! : Are you a frequent online shopper? Do you get hooked by great deals? Or are you just an occasional shopper? Whatever the case, when it comes to online security most of us fall at the first hurdle. In this module, you will learn about online identity theft when shopping online, choosing a reliable online store, what to do if your on-line account gets hacked, plus more!
Module 9 - Phishing: A lot of times, malicious links can come from friends who have been infected, or from emails that look legitimate, but are actually fake. This is known as phishing. In this module, you will learn about how phishing works, the types of phishing and what a phishing email looks like.
Module 10 - Ransomware: Ransomware is malicious software which encrypts files on your computer or completely locks you out. It’s spread by hackers who then demand a ransom, claiming that, if you pay, you’ll receive the decryption key to recover your files. Ransomware has taken over as today’s number one security threat. In this module, you will learn about the types of ransomware, how ransomware affects your PC and the tips for if you've been affected by a ransomware attack.
Module 11 - Safeguarding Wi-Fi Networks: Securing the home network should be a top priority for each of us interested in keeping data safe and secure. Wireless network security is generally weak, and prone to exploits. Your home Wi-Fi network isn’t automatically secure. In this module you will learn about the types of Wi-Fi networks, how to protect them and possible dangers in public Wi-Fi networks.
Module 12 - Safeguarding Smart TVs: Any TV that can be connected to the internet is a smart TV. A user can stream media services and run apps, browse the internet, access internet music channels, shop online, and access on-demand video services. In this module, you will learn about how to protect your Smart TV From Cyber-Criminals.
Module 13 - Some Extra Tips: We will go through some useful tips and will ensure that your online assets are safe.
Module 1 - Overview: We will give you an overview of why data protection laws are needed in today’s world. We’ll then outline the purpose of the General Data Protection Regulation, and cover a timeline for its introduction throughout the European Union. The General Data Protection Regulation, or GDPR, makes law the fundamental right of every living person to control their personal information, and have it adequately protected by any group processing and holding it.
Module 2 - GDPR Principles: We’ll take a closer look at the regulation's underlining principles of lawfulness and accountability.
Module 3 - Data Subject Rights: In this module, we’ll take a closer look at your guaranteed rights as a staff member and private citizen under the GDPR. These include, the right to be informed, the right of access, right to rectification, right to erasure, right to restrict processing, right to data portability and the right to object.
Module 4 - Responsibilities: The final module we will be going through some precautions you can take to help keep your personal data safe while at work. We’ll then finish with a brief overview on how to report a data breach. You can also check out a webinar we did on "Management Of A Data Breach Under The GDPR" by clicking here.
The CCPA was passed in June 2018 by California legislators and has gone into effect since January 1, 2020. However, an amendment has been passed, introducing a 6-month enforcement grace period to July 1, 2020. This means that the Attorney General of California can't start enforcement actions until July of 2020.
CCPA is often called "California's Mini-GDPR". However, there are distinct differences between the two legislations.
CCPA is considered to be the most exhaustive privacy law in the USA. It provides California residents specific enumerated rights and it has far-reaching national and global implications for businesses.
This course will explain CCPA in layman's terms, helping you prepare your business to comply with the law. This course can be taken by anyone with any level of privacy knowledge or experience.
Module 1 - Introduction to Cyber Security: In this module we will learn why cyber security is such an important topic in today’s workplace, and how you could be a target for hackers. Cyber security can seem overwhelming to many. When you hear statistics that thousands of new types of malicious software are reported each year, it is not hard to imagine the impact a virus or computer compromise can have on our networks and the information contained within those systems.
Module 2 - Introduction to Malware: In this module, we’ll cover the different types of malware, and how they can affect your computer, devices and workplace. Malicious software, or Malware for short, is any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising.
Module 3 - Internet Acceptable Use: In this module we’ll cover examples of policies your employer is likely to have on using the internet at work, performing tasks online, and sending and receiving emails. We’ll then look at some precautions you can take to the avoid becoming the target for a breach via email. An Internet Acceptable Use policy tells you how you may use the company’s Internet facilities, it outlines your personal responsibilities and informs what you must and must not do.
Module 4 - Information Security: In this module, we will examine the rules for storing and classifying data. As with email and internet usage, maintaining an awareness of these procedures will be critical to you helping your organisation to protect itself against leaks. Information can take many forms, including: Hard copy data held on paper, Data stored electronically in computer systems, also known as Data at Rest and Data stored using electronic media such as USB drives, disks and tapes, otherwise known as Data in Use.
Module 5 - Device Security: In this module we will now cover guidelines for keeping your mobiles, tablets, laptops and home networks safe from malware and breaches. We’ll then briefly take a look at social engineering, and learn what tell tale signs to watch out for at work and on social media.
Module 6 - Legislation and Regulation: In this module we’ll take an overview of the UK’s Data Protection Act, and the EU’S General Data Protection Regulation. Both sets of legal requirements are the guiding lights on what information should be protected at all times from insider leaks and cyber attacks.
Module 1 - Awareness: In this module we’ll learn how to ensure that key decision makers in your organisation are aware of what GDPR entails, and can appreciate its impact on the business.
Module 2 - Information you Hold: In this module we’ll learn how to assess what information you hold and what your record keeping requirements are.
Module 3 - Communicating Privacy Information: In this module, we’ll learn how to communicate privacy information to data subjects. In order to do this effectively, you’ll need to first assess the type of data you collect, identify when you’ll need to communicate privacy matters, and identify what kind of information needs to be provided.
Module 4 - Individual Rights: In this module, we’ll learn more about: The key rights individuals have in relation to their data and what your organisation needs to do to guarantee these rights.
Module 5 - Subject Access Requests: In this module, we’re now going to learn about how to deal with subject access requests. From explaining the requirements for a valid SAR, through to handling third party personal data, we’ll be looking at some practical ideas your organisation can put in place to deal with these requests quickly and efficiently. You can also check out a webinar we did on "Automate DSARs Through Intuitive Technology" by clicking here.
Module 6 - Lawfulness: In this module, we’ll learn how to apply the principle of lawfulness to processing personal data. This module is most applicable to data controllers rather than processors. However, bear in mind that most if not all processors will also be controllers in some circumstances, such as over their own employees' data and business contacts.
Module 7 - Consent: In this module, we’ll learn how to obtain consent from individuals for processing standard, high risk and sensitive personal data. After covering the key elements that must be in place, we’ll move on to discussing consent in more specific contexts.
Module 8 - GDPR & Children: In this module, we’ll cover GDPR’s special considerations for children and discuss some practical compliance issues.
Module 9 - What is a Data Breach? In this module, we’ll begin by explaining what a data breach is. We’ll then cover GDPR’s obligations and duties on data breaches. This will be followed by learning how to assess the risks involved in data breaches and develop policies and procedures for managing them. You can also check out a webinar we did on "Management Of A Data Breach Under The GDPR" by clicking here.
Module 10 - Data Protection by Design and Default: In this module, we’ll first cover the key principles that underpin 'data protection by design and by default'. We’ll then describe the circumstances in which a Data Protection Impact Assessment, or DPIA might be needed. To finish, we’ll learn how to carry out and submit a DPIA. You can also check out a webinar we did on "Completing A Data Protection Impact Assessment (DPIA)" by clicking here.
Module 11 - The Data Protection Officer: In this module, we’ll learn all about the Data Protection Officer, or DPO. After covering their role in detail, we’ll cover the factors that will help you decide whether your organisation needs to appoint one. You can also check out a webinar we did on "Why A DPO-As-A-Service Can Be The Best Option For Many Companies" by clicking here.
Module 12 - Cross Border Processing: In the final module, we’ll learn how to navigate situations where you process data in more than one EEA Member State. We’ll also explain the rules on transfers of personal data outside of the EEA, which are broadly the same as under the current regime.
PrivacyEngine™ Learning Management System (LMS) can help you ensure your employees are fully trained up.