PRIVACY + SECURITY TRAINING COURSE FINDER
PRIVACY | DATA SECURITY |
FERPA | HIPAA |
VIGNETTES | WHITEBOARDS |
Privacy
Primary Courses
Global Privacy and Data Protection (25 min, 15 min)
Global Privacy and Data Protection (30 min, 25 min, 20 min, 15 min and 12 min)
Global Privacy and Data Protection (25 min) for IT
Privacy and Data Security
Dimensions of Data Privacy
Privacy Awareness
Privacy By Design
GDPR and EU Data Protection
GDPR Training (20 min, 7 min)
European Union Privacy Law
United States Federal Privacy Laws
FTC Act Section 5
United States Privacy Law
Privacy Act for Federal Contractors
Gramm-Leach-Bliley Act
Children’s Online Privacy Protection Act (COPPA)
United States State Privacy Laws
Biometric Privacy Laws
U.S. State Consumer Privacy Laws
California Consumer Privacy Act (CCPA) (15 min, 10 min)
California Consumer Privacy Act (CCPA) Interactive Whiteboard
California Health Privacy
Colorado Privacy Act (CPA)
Texas Health Privacy
Virginia’s Consumer Data Protection Act (CDPA)
Washington My Health My Data Act (MHMDA)
Worldwide Privacy Laws
Asia Pacific: Privacy Law in Asia-Pacific
Australia’s Privacy Act
Brazil: LGPD
Brazil: LGPD Interactive Whiteboard
Canada: PIPEDA
China: PIPL (20 min, 5.5 min)
Colombia: GPDPL
Hong Kong: PDPO
India: Digital Personal Data Protection Act
Japan: APPI
Latin America: Privacy Law in Latin America
Mexico: Federal Privacy Law
South Korea: PIPA
Singapore: PDPA
Turkey: LPPD
Global Privacy Law
General Privacy Topics
Privacy, Risk and Trust
Nothing to Hide: Why Privacy Matters
Importance of Protecting Personal Data
Defining Personal Information
What Is Personal Data?
Sensitive Data
Privacy Principles
The Relationship Between Privacy and Security
Role-based Topics
Telemarketing and the TCPA
Texting and the TCPA
Emailing and the CAN-SPAM Act
Canadian Anti-Spam Legislation (CASL)
Privacy in Online Advertising
Financial Privacy Overview
FTC Red Flags Rule
Dark Patterns
Vendor Management: Sharing Data with Third Parties
Online Social Media (15 min, 10 min)
Working from Home
Ethical Duties of Data Protection in Legal Practice
Threats and Vulnerabilities
The Costs of Violations
Artificial Intelligence
Artificial Intelligence
Technology and Data Ethics
Data Management
Data Mapping
Data Minimization
Data Protection Impact Assessments
Data Retention
Data Subject Requests
Life Cycle of Personal Data
Secondary Uses
Data Security
Primary Data Security
Data Security Awareness (30 min, 20 min, 10 min)
Privacy and Data Security
Data Security, Security
Ransomware
Working from Home
Five Key Points for Data Security
Phishing, Illustrated (12 min, 6 min)
Phishing, non-illustrated
Avoiding Phishers, Hackers and Social Engineers
Social Engineering
Social Engineering: Spies & Sabotage
Data Security, Best Practices
Data Security Overview
Humans are the Biggest Data Security Risk
Passwords
Portable Devices and Remote Access
Websites and Software
Malware
Email
Physical Access
Encryption
Data Disposal
Data Breach
Data Security, Importance
Relationship Between Privacy and Security
Threats and Vulnerabilities
Threats and Vulnerabilities for Law Firms
Cost of Violations
Cost of Violations for Law Firms
FERPA
FERPA for Higher Education (30 min, 15 min)
FERPA for K-12 Education
FERPA Interactive Whiteboard
Cloud Computing in Education
HIPAA
HIPAA Privacy for Covered Entities
HIPAA Overview
HIPAA Privacy for CEs (10 min, 20 min, 30 min)
HIPAA Privacy and Security
Medicare: Preventing Fraud, Waste, and Abuse
HIPAA Privacy for Business Associates
HIPAA Privacy for BAs (7 min, 20 min, 30 min)
HIPAA Overview for Law Firms
HIPAA Security
HIPAA Security for CEs and BAs (30 min, 20 min, 10 min)
HIPAA Short Topics
HIPAA and Health Privacy
Protected Health Information (PHI)
Confidentiality
Snooping
Minimum Necessary Rule
Disclosures
Individual Rights
Authorization
Accounting for Disclosures
Enforcement
Business Associates
Psychotherapy Notes
The HITECH Act
Health Privacy: HIPAA and Beyond
Humans Are the Biggest Safety Risk
Social Engineering: Spies and Sabotage
Social Engineering
Passwords
Website and Software
Email
Malware
Physical Access
Portable Devices and Remote Access
Encryption
Data Disposal
Data Breach
De-Identification
Research
Social Media for Healthcare (15 min, 10 min)
VIGNETTES
Vignette – The Rude Refrigerator
Vignette – The Inquisitive Interrogator: A Data Minimization Story
Vignette – Facebook and the Mysterious Blue Disease
Vignette – The App from Hell
Vignette – The Data Misuse Nightmare
Vignette – The Password Borrower
Vignette – Ransomware Attack
Vignette – Taking Devices for a Drive
Vignette – The Laptop That Traveled the World
Vignette – The Thumb Drive Discovery
Vignette – The Email From the IT Department
Vignette – The Snooper
Vignette – The Forsaken Workstation
Vignette – The Celebrity’s Hand
Vignette – The Concerned Meddlers
Spot the Risks: Privacy & Security Game
Spot the Risks: HIPAA Privacy & Security Game
Spot the Risks: Privacy & Cybersecurity Game
Secure Workspaces Game
WHITEBOARDS
U.S. Privacy Laws
Children’s Online Privacy Protection Act (COPPA)
Family Educational Rights and Privacy Act (FERPA)
FTC Section 5
Health Insurance Portability and Accountability Act (HIPAA)
CAN-SPAM Act
Telemarketing Consumer Protection Act (TCPA)
U.S. State Privacy Laws
Biometric Privacy Laws
US State Consumer Privacy Laws
Data Security
California Consumer Privacy Act (CCPA)
Colorado Privacy Act (CPA)
Connecticut Data Privacy Act
Delaware Personal Privacy Act
Florida Digital Bill of Rights
Indiana Consumer Data Protection Act
Iowa Consumer Data Protection Act
Montana Consumer Data Privacy Act
New Jersey Privacy Act
New York Shield Act
Oregon Consumer Privacy Act
Tennessee Data Privacy and Security Act
Texas Data Privacy and Security Act
Utah Consumer Privacy Act
Virginia Consumer Data Protection Act (CDPA)
Washington My Health My Data Act (MHMDA)
United States and Canada
Please Contact Us If You Are Interested In
Privacy or Security Training
We can provide you with a login so you can evaluate the programs. Click here for our catalog.