Training Course Finder

Privacy and Security

PRIVACY + SECURITY TRAINING COURSE FINDER

Explore our privacy course finder for your next great training. Request a demo!

PRIVACY DATA SECURITY
FERPA HIPAA
VIGNETTES WHITEBOARDS

 

Privacy

Primary Courses

Global Privacy and Data Protection (25 min, 15 min)
Global Privacy and Data Protection (30 min, 25 min, 20 min, 15 min and 12 min)
Global Privacy and Data Protection (25 min) for IT
Privacy and Data Security
Dimensions of Data Privacy
Privacy Awareness 
Privacy By Design

GDPR and EU Data Protection

GDPR Training (20 min, 7 min)

United States Federal Privacy LawsUS Capitol

Children’s Online Privacy Protection Act (COPPA)
FTC Act Section 5
Gramm-Leach-Bliley Act
Privacy Act for Federal Contractors
United States Privacy Law

United States State Privacy Laws

Biometric Privacy Laws
California Consumer Privacy Act (CCPA) (15 min, 10 min)
California Consumer Privacy Act (CCPA) Interactive Whiteboard
California Health Privacy
Colorado Privacy Act (CPA)
Texas Health Privacy
U.S. State Consumer Privacy Laws
Virginia’s Consumer Data Protection Act (CDPA)

Worldwide Privacy LawsWorld Globe

Australia’s Privacy Act
Asia Pacific Privacy Law
Brazil: LGPD
Brazil: LGPD Interactive Whiteboard
Canada: PIPEDA
China: PIPL (20 min, 5.5 min)
Colombia: GPDPL
Hong Kong: PDPO
India’s Digital Personal Data Protection Act (DPDPA)
Japan: APPI
Latin America Privacy Law
Mexico: Federal Privacy Law
Singapore: PDPA
South Korea: PIPA
Turkey: LPPD
Global Privacy Law

General Privacy Topics

Artificial Intelligence
Defining Personal Information
Importance of Protecting Personal Data
Nothing to Hide: Why Privacy Matters
Privacy Principles
Privacy, Risk and Trust
Sensitive Data
Technology and Data Ethics
The Relationship Between Privacy and Security
Understanding Privacy
What Is Personal Data?

Role-based Topics

Canadian Anti-Spam Legislation (CASL)
Costs of Violations
Dark Patterns
Data Mapping
Data Minimization
Data Protection Impact Assessments
Data Retention
Data Subject Requests
Emailing and the CAN-SPAM Act
Ethical Duties of Data Protection in Legal Practice
Financial Privacy Overview
FTC Red Flags Rule
History of Privacy
Life Cycle of Personal Data
Privacy in Online Advertising
Secondary Use
Social Media (15 min, 10 min)
Telemarketing and the TCPA
Texting and the TCPA
Threats and Vulnerabilities
Vendor Management: Sharing Data with Third Parties
Working from Home

Back to top

Data Security

Primary Data Security

Data Security Awareness (30 min, 20 min, 10 min)
Privacy and Data Security

Data Security, Security

Avoiding Phishers, Hackers and Social Engineers
Five Key Points for Data Security
Phishing, Illustrated (12 min, 6 min)
Phishing, non-illustrated
Ransomware
Social Engineering
Social Engineering: Spies & Sabotage
Working from Home

Data Security, Best Practices

Data Breach
Data Disposal
Data Security Overview
Email
Encryption
Humans are the Biggest Data Security Risk
Malware
Passwords
Payment Card Data (PCI)
Physical Access
Portable Devices and Remote Access
Websites and Software

Data Security, Importance

Cost of Violations
Cost of Violations for Law Firms
Relationship Between Privacy and Security
Threats and Vulnerabilities
Threats and Vulnerabilities for Law Firms

Back to top

FERPA

FERPA for Higher Education (30 min, 15 min)
FERPA for K-12 Education
FERPA Interactive Whiteboard
Cloud Computing in Education

Back to top

HIPAA

HIPAA Training Book

HIPAA Privacy for Covered Entities

HIPAA Overview
HIPAA Privacy for CEs (10 min, 20 min, 30 min)
HIPAA Privacy and Security
Medicare: Preventing Fraud, Waste, and Abuse

HIPAA Privacy for Business Associates

HIPAA Privacy for BAs (7 min, 20 min, 30 min)
HIPAA Overview for Law Firms

HIPAA Security

HIPAA Security for CEs and BAs (30 min, 20 min, 10 min)

HIPAA Short Topics

Accounting for Disclosures
Authorization
Business Associates
Confidentiality
Data Breach
Data Disposal
De-Identification
Disclosures
Email
Encryption
Enforcement
Health Privacy: HIPAA and Beyond
HIPAA and Health Privacy
Humans Are the Biggest Safety Risk
Individual Rights
Malware
Minimum Necessary Rule
Passwords
Physical Access
Portable Devices and Remote Access
Protected Health Information (PHI)
Psychotherapy Notes
Research
Snooping
Social Engineering
Social Engineering: Spies and Sabotage
Social Media for Healthcare (15 min, 10 min)
The HITECH Act
Website and Software

Back to top

VIGNETTES

HIPAA Training Game

App from Hell
Celebrity’s Hand
Concerned Meddlers
Data Misuse Nightmare
Email From the IT Department
Facebook and the Mysterious Blue Disease
Forsaken Workstation
Inquisitive Interrogator: A Data Minimization Story
Laptop That Traveled the World
Password Borrower
Ransomware Attack
Rude Refrigerator
Snooper
Taking Devices for a Drive
Thumb Drive Discovery
Spot the Risks: Privacy & Security Game
Spot the Risks: HIPAA Privacy & Security Game
Spot the Risks: Privacy & Cybersecurity Game
Secure Workspaces Game

Back to top

WHITEBOARDS

U.S. Privacy Laws

CAN-SPAM Act
Children’s Online Privacy Protection Act (COPPA)
Family Educational Rights and Privacy Act (FERPA)
FTC Section 5
Health Insurance Portability and Accountability Act (HIPAA)
Telemarketing Consumer Protection Act (TCPA)

U.S. State Privacy Laws

Biometric Privacy Laws
US State Consumer Privacy Laws
Data Security
California Consumer Privacy Act (CCPA)
Colorado’s Privacy Act (CPA)
Connecticut’s Data Privacy Act
NY Shield Act
Utah’s Consumer Privacy Act
Virginia’s Consumer Data Protection Act (CDPA)

Worldwide Privacy Laws
United States and Canada

United States
Canada

Latin America

Argentina
Aruba
Brazil
Bolivia
Chile
Colombia
Costa Rica
Dominican Republic
Ecuador
El Salvador
Guatemala
Honduras
Jamaica
Mexico
Nicaragua
Panama
Paraguay
Peru
Trinidad and Tobago
Uruguay
Venezuela

Asia-Pacific

Australia
Cambodia
China
Hong Kong
India
Indonesia
Japan
Kazakhstan
Kyrgyzstan
Macau
Malaysia
Mongolia
New Zealand
Philippines (DPA)
Singapore
South Korea
Taiwan
Thailand
Uzbekistan
Vietnam

Europe

GDPR
Armenia
Azerbaijan
Belarus
Bosnia Herzegovina
Georgia
Kosovo
Moldova
Montenegro
North Macedonia
Russia
Serbia
Switzerland
Turkey
Ukraine
United Kingdom

Africa

Ghana
Eswatini
Israel
Lebanon
Lesotho
Namibia
South Africa
Zambia

Back to top
Divider 02

Please Contact Us If You Are Interested In
Privacy or Security Training

We can provide you with a login so you can evaluate the programs. Click here for our catalog.

    First Name

    Last Name

    Organization

    Title

    E-mail

    Phone No.

    Address

    Please tell us about your training needs

    PROFESSOR SOLOVE'S NEWSLETTER
    Professor Solove’s newsletter covers his latest writings, events, and training. It is sent weekly.
    You can unsubscribe at any time. Click to see a sample issue.
    Would you be interested in subscribing?
    YesNoAlready Subscribed