Privacy and Information Security (Update Available)
Overview/Description Target Audience Expected Duration Lesson Objectives Course Number Overview/Description
Information about individuals is used by businesses to provide customers with a huge array of targeted goods and personalized services that consumers have come to expect. If it lands in the wrong hands, this same information can result in harm to the very individuals it was meant to serve. The protection of an individual's personal information has business implications that extend beyond the privacy of any one individual. Private information relative to certain businesses and industries is protected by various laws. At present, there is no broad, general federal law protecting the privacy of customer information; most protections are aimed at particular types of information (such as medical or student records, for example) or particular types of businesses (such as healthcare and financial services providers, for example). Customers and consumers expect their information to be protected; businesses that recognize the need to make privacy part of their business strategy, are ahead of the game. However, the ability of a business to protect private information it collects as part of its business is only as strong as its weakest link – the human factor – something that technology can't easily overcome. This course is aimed at helping individuals who work with private information understand the ways that this information can be disclosed inadvertently, with an aim to ensure that private information doesn't fall into the wrong hands. SkillSoft's Legal Compliance courses are developed and maintained with subject matter support provided by the Labor, Employment, and Employee Benefits Law Group of the law firm of Baker Donelson.
Target Audience
All employees, especially those who have access to private information
Privacy and Information Security (Update Available)
match laws that govern the protection of specific types of information for individuals with the types of information they regulate and the industries/sectors most affected
recognize examples of personal information that might be considered private
identify the potential avenues of exposure businesses must overcome in order to protect private individual information from being disclosed
identify the characteristics/tendencies social engineers capitalize on to get the information they want
recognize examples of social engineering
identify guidelines for ensuring that private information is protected