PRIVACY + SECURITY TRAINING COURSE FINDER
Explore our privacy course finder for your next great training. Request a demo!
PRIVACY | DATA SECURITY |
FERPA | HIPAA |
VIGNETTES | WHITEBOARDS |
Privacy
Primary Courses
Global Privacy and Data Protection (25 min, 15 min)
Global Privacy and Data Protection (30 min, 25 min, 20 min, 15 min and 12 min)
Global Privacy and Data Protection (25 min) for IT
Privacy and Data Security
Dimensions of Data Privacy
Privacy Awareness
Privacy and Data Protection By Design
GDPR and EU Data Protection
GDPR Training (20 min, 7 min)
European Union AI Act
United States Federal Privacy Laws
Children’s Online Privacy Protection Act (COPPA)
FTC Act Section 5
Gramm-Leach-Bliley Act
Privacy Act for Federal Contractors
United States Privacy Law
United States State Privacy Laws
Biometric Privacy Laws
California Consumer Privacy Act (CCPA) (15 min, 10 min)
California Consumer Privacy Act (CCPA) Interactive Whiteboard
California Health Privacy
Colorado Privacy Act (CPA)
Texas Health Privacy
U.S. State Consumer Privacy Laws
Virginia’s Consumer Data Protection Act (CDPA)
Worldwide Privacy Laws
Australia’s Privacy Act
Asia Pacific Privacy Law
Brazil: LGPD
Brazil: LGPD Interactive Whiteboard
Canada: PIPEDA
China: PIPL (20 min, 5.5 min)
Colombia: GPDPL
Hong Kong: PDPO
India’s Digital Personal Data Protection Act (DPDPA)
Japan: APPI
Latin America Privacy Law
Mexico: Federal Privacy Law
Singapore: PDPA
South Korea: PIPA
Turkey: LPPD
Global Privacy Law
General Privacy Topics
Artificial Intelligence
Defining Personal Information
Importance of Protecting Personal Data
Nothing to Hide: Why Privacy Matters
Privacy Principles
Privacy, Risk and Trust
Sensitive Data
Technology and Data Ethics
The Relationship Between Privacy and Security
Understanding Privacy
What Is Personal Data?
Role-based Topics
Canadian Anti-Spam Legislation (CASL)
Costs of Violations
Dark Patterns
Data Mapping
Data Minimization
Data Protection Impact Assessments
Data Retention
Data Subject Requests
Emailing and the CAN-SPAM Act
Ethical Duties of Data Protection in Legal Practice
Financial Privacy Overview
FTC Red Flags Rule
History of Privacy
Life Cycle of Personal Data
Privacy in Online Advertising
Secondary Use
Social Media (15 min, 10 min)
Telemarketing and the TCPA
Texting and the TCPA
Threats and Vulnerabilities
Vendor Management: Sharing Data with Third Parties
Working from Home
Data Security
Primary Data Security
Data Security Awareness (30 min, 20 min, 10 min)
Privacy and Data Security
Data Security, Security
Avoiding Phishers, Hackers and Social Engineers
Five Key Points for Data Security
Phishing, Illustrated (12 min, 6 min)
Phishing, non-illustrated
Ransomware
Social Engineering
Social Engineering: Spies & Sabotage
Working from Home
Data Security, Best Practices
Data Breach
Data Disposal
Data Security Overview
Email
Encryption
Humans are the Biggest Data Security Risk
Malware
Passwords
Payment Card Data (PCI)
Physical Access
Portable Devices and Remote Access
Websites and Software
Data Security, Importance
Cost of Violations
Cost of Violations for Law Firms
Relationship Between Privacy and Security
Threats and Vulnerabilities
Threats and Vulnerabilities for Law Firms
FERPA
FERPA for Higher Education (30 min, 15 min)
FERPA for K-12 Education
FERPA Interactive Whiteboard
Cloud Computing in Education
HIPAA
HIPAA Privacy for Covered Entities
HIPAA Overview
HIPAA Privacy for CEs (10 min, 20 min, 30 min)
HIPAA Privacy and Security
Medicare: Preventing Fraud, Waste, and Abuse
HIPAA Privacy for Business Associates
HIPAA Privacy for BAs (7 min, 20 min, 30 min)
HIPAA Overview for Law Firms
HIPAA Security
HIPAA Security for CEs and BAs (30 min, 20 min, 10 min)
HIPAA Short Topics
Accounting for Disclosures
Authorization
Business Associates
Confidentiality
Data Breach
Data Disposal
De-Identification
Disclosures
Email
Encryption
Enforcement
Health Privacy: HIPAA and Beyond
HIPAA and Health Privacy
Humans Are the Biggest Safety Risk
Individual Rights
Malware
Minimum Necessary Rule
Passwords
Physical Access
Portable Devices and Remote Access
Protected Health Information (PHI)
Psychotherapy Notes
Research
Snooping
Social Engineering
Social Engineering: Spies and Sabotage
Social Media for Healthcare (15 min, 10 min)
The HITECH Act
Website and Software
VIGNETTES
App from Hell
Celebrity’s Hand
Concerned Meddlers
Data Misuse Nightmare
Email From the IT Department
Facebook and the Mysterious Blue Disease
Forsaken Workstation
Inquisitive Interrogator: A Data Minimization Story
Laptop That Traveled the World
Password Borrower
Ransomware Attack
Rude Refrigerator
Snooper
Taking Devices for a Drive
Thumb Drive Discovery
Spot the Risks: Privacy & Security Game
Spot the Risks: HIPAA Privacy & Security Game
Spot the Risks: Privacy & Cybersecurity Game
Secure Workspaces Game
WHITEBOARDS
U.S. Privacy Laws
CAN-SPAM Act
Children’s Online Privacy Protection Act (COPPA)
Electronic Communications Privacy Act (ECPA)
Family Educational Rights and Privacy Act (FERPA)
FTC Section 5
Health Insurance Portability and Accountability Act (HIPAA)
Telemarketing Consumer Protection Act (TCPA)
U.S. State Privacy Laws
Biometric Privacy Laws
US State Consumer Privacy Laws
Data Security
California Consumer Privacy Act (CCPA)
Colorado’s Privacy Act (CPA)
Connecticut’s Data Privacy Act
Delaware Personal Privacy Act
Florida Digital Bill of Rights
Indiana Consumer Data Protection Act
Iowa Consumer Data Protection Act
Kentucky Consumer Data Protection Act
Maryland Online Data Privacy Act
Minnesota Consumer Data Protection Act
Montana Consumer Data Privacy Act
New Hampshire Data Privacy Act
New Jersey Privacy Act
NY Shield Act
Oregon Consumer Privacy Act
Tennessee Data Privacy and Security Act
Texas Data Privacy and Security Act
Utah’s Consumer Privacy Act
Vermont Data Privacy Act
Virginia’s Consumer Data Protection Act (CDPA)
Washington’s My Health My Data Act (MHMDA)
Worldwide Privacy Laws
United States and Canada
Please Contact Us If You Are Interested In
Privacy or Security Training
We can provide you with a login so you can evaluate the programs. Click here for our catalog.