Information Security Awareness (Update Available)


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number


Overview/Description
Federal employees must be aware of the potential threats to the information systems they use in their daily work. To do so, federal employees must understand how to adequately protect data that is collected, processed, and used by the agency, including personally identifiable information (PII). In this course, you'll learn about the threats to information systems and the responsibility of federal employees to protect information and ensure the secure operation of federal information systems. This course was developed with subject matter support provided by the Labor, Employment, and Employee Benefits Law Group of the law firm of Sheehan Phinney Bass & Green PA. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with any federal, state, or local laws. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking professional counsel. The information contained herein is provided only as general information that may or may not reflect the most current legal developments. This information is not provided in the course of an attorney-client relationship and is not intended to constitute legal advice or to substitute for obtaining legal advice from an attorney licensed in your state.

Target Audience
Federal government employees, employees of federal agencies, and supervisors and managers of federal employees

Prerequisites
None

Expected Duration (hours)
0.3

Lesson Objectives

Information Security Awareness (Update Available)

  • identify examples of the types of incidents that can compromise information security
  • recognize examples of information security threats
  • identify security measures and best practices federal employees should use in their everyday work
  • recognize how to protect information systems
  • Course Number:
    fgov_01_a43_lc_enus