Data Protection and Device Security
- 24 topics | 51m
- Up to 30 languages
- Transcripts
Employees play a key role in helping ensure the security of company data. Today’s technology and networking capabilities allow employees to work from virtually anywhere, but precautions are necessary to protect company assets and information. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice.
IN THIS COURSE
-
Using Mobile Devices Securely3m
-
Knowledge Check: Using Mobile Devices Securely1m
-
Ensuring Physical Security3m
-
Knowledge Check: Ensuring Physical Security1m
-
Preventing Data Loss and Theft3m
-
Knowledge Check: Preventing Data Loss and Theft1m
-
Insider Threats2m
-
Knowledge Check: Insider Threats1m
-
Reporting Data Theft2m
-
Knowledge Check: Reporting Data Theft1m
-
Proper Document Disposal3m
-
Knowledge Check: Proper Document Disposal1m
-
BYOD3m
-
Knowledge Check: BYOD1m
-
Remote Working Concerns2m
-
Knowledge Check: Remote Working Concerns1m
-
Security Patching2m
-
Knowledge Check: Security Patching1m
-
Working in Public Places2m
-
Knowledge Check: Working in Public Places4m
-
Public and Home Wi-Fi Security3m
-
Knowledge Check: Public and Home Wi-Fi Security1m
-
Secure Printing2m
-
Knowledge Check: Secure Printing1m
YOU MIGHT ALSO LIKE
COMPLIANCE-COURSE
GDPR Short: Selling or Sharing Data (UK)
COMPLIANCE-COURSE
Supply Chain Short: Supply Chain Due Diligence
COMPLIANCE-COURSE
Cybersecurity Short: Proper Use of E-mail