GDPR - Rights of the Data Subjects (Video)
This video explains the rights people have under GDPR when it comes to how their data is stored, processed, and destroyed
1:07 minutes
*Courses may vary.
Search Courses
This video explains the rights people have under GDPR when it comes to how their data is stored, processed, and destroyed
1:07 minutes
Brief lesson covers the particulars of how GDPR defines data and its uses.
1:58 minutes
This video covers the impact non-compliance with GDPR regulations can have on your organization.
1:28 minutes
This module provides a detailed explanation of Criminal Justice Information Security (CJIS) policy requirements, who must comply with CJIS policy and how to respond to incidents involving CJI.
5:26 minutes
This module defines criminal justice information (CJI), the protocols required to access and handle CJI and the consequences of noncompliance.
9:02 minutes
The Foreign Corrupt Practices Act (FCPA) monitors the international business community to prevent bribes, kickbacks and other unacceptable practices when interacting with foreign officials.
9:34 minutes
This module will review federally-required practices for safely using and storing SSAprovided data, including best practices, review of applicable laws, and civil and criminal penalties for PII loss.
10:43 minutes
The Electronic Funds Transfer Act covers what consumers and banks should do if there are fraudulent charges.
9:03 minutes
This module will define the Gramm-Leach-Bliley Act (GLBA), explain its purpose and detail the consequences of non-compliance.
6:25 minutes
This module is an introduction to the California Consumer Privacy Act, or CCPA.
9:50 minutes
In this module, we identify types of information protected by Family Educational Rights and Privacy Act (FERPA) and specific regulations for post-secondary institutions.
7:43 minutes
In this module, we identify types of information protected by Family Educational Rights and Privacy Act (FERPA) and specific regulations for K-12 institutions.
7:49 minutes
This brief video extrapolates on how many people are authorized to access one person’s health records.
1:54 minutes
This module defines protected health information (PHI), outlines best practices for handling PHI, and explains the role healthcare executives play in ensuring HIPAA compliance by employees.
14:06 minutes
This module defines protected health information (PHI), outlines best practices for handling PHI and the responsibilities of healthcare managers in protecting PHI and ensuring HIPAA compliance.
14:21 minutes
This brief video shows the possible consequences of a PHI breach at your organization.
1:45 minutes
This module briefly covers the main points of HIPAA compliance.
1:23 minutes
Please complete and submit the form below.