Privacy & Data Protection Essentials

Privacy and data protection training and best practices for protecting personal and corporate data and understanding each individual's personal responsibility for protecting the confidential data of the organization's employees and its customers
binary code with padlock image and data privacy and protection training

Course Description

Everybody handles some sort of private and confidential information at work; however, it is important to ascertain which data is private and which is not? Our privacy and data protection training course answers this fundamental question and more. It outlines the importance of privacy in the workplace, including the three common categories of protected information. It also teaches the five-step process for handling private information and variations in privacy laws in the United States and abroad.

Users will learn best practices for protecting personal and corporate data in the workplace and understand their personal responsibility for protecting the confidential data of other employees and customers. The EU version of this course (6078) includes an overview of the General Data Protection Regulation (GDPR).

Course Curriculum

What is privacy and why is it important?

  • Legal, financial, reputational and personal consequences of failing to protect customers’ private data
  • Defining the three types of private information: personally identifiable information (PII), sensitive personally identifiable information (SPII) and confidential business information

How employees can use the ARPER strategy to protect private information: Assess, Reduce, Protect, Eliminate, Respond

An overview of the most important American and international privacy laws: Privacy Act, FTC Act, GLBA, HIPAA, GDPR, etc.

Cybersecurity awareness and data security are crucial to the strength and growth of your organization. A strong security protocol protects the sensitive data of both the business and its customers. By exploring the risks of malware, phishing, ransomware, internal threats and network vulnerabilities, this course helps you take the step forward in protecting your organization from malicious cyberattacks on sensitive user data. 

Request a Demo or Quote

First Name
Last Name
Job Title
Email Address
Phone Number
Organization Name
Organization Size
Product/Solution Area of Interest
GLS Logo

Your download is complete!

Need more training?