Preventing Identity Theft
- 7 topics | 28m 48s
- Up to 30 languages
- Transcripts
More and more business and communication are happening online, leading to organizations holding a great deal of personally identifiable information (PII) about their clients and customers. This PII can make transactions easier, but if safety measures aren't taken, it can also give identity thieves an opportunity. This course will make you more aware of the risk of customers' PII being used to steal their identities. You'll learn about precautions to keep PII safe and how to reduce the risk of malware or successful phishing attacks. Knowing some of the preventive measures to take can help safeguard both the client and your company as a whole.This course was developed with subject matter support provided by Baker, Donelson, Bearman, Caldwell & Berkowitz, PC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice.
WHAT YOU WILL LEARN
-
Preventing Identity Theft
-
recognize the types of consequences employees could face for failing to protect PII
-
recognize what you can do to help secure electronic PII for clients
-
recognize precautions that you can take to help secure physical documents that contain client PII
-
Knowledge Check: Protecting PII
-
recognize ways to prevent the spread of malware
-
recognize potential warning signs of phishing attempts
-
Knowledge Check: Accessing PII
IN THIS COURSE
-
Preventing Identity Theft2m
-
The Need to Protect PII5m
-
Securing Physical and Electronic PII4m
-
Knowledge Check: Protecting PII4m
-
Preventing the Spread of Malware4m
-
Recognize Phishing Attempts4m
-
Knowledge Check: Accessing PII3m
YOU MIGHT ALSO LIKE
COMPLIANCE-COURSE
Overcoming Your Own Unconscious Biases
COMPLIANCE-COURSE
A Manager's Guide to Discipline and Documentation
COMPLIANCE-COURSE
Procurement Integrity