Data Security for GDPR Compliance - Up to 10 delegates
Skillcast
Summary
Overview
The security of personal data is absolutely critical for General Data Protection Regulation (GDPR) compliance. The consequences of personal being lost or stolen are severe and fines can run into millions. Learn what steps you should take for the safe use of our information, systems and networks.
In this course you'll learn about information classification, email security, network and physical access control and information security on the move. You'll also look at what information security means to us and what you should do to prevent information loss or theft.
Description
Learning Objectives
- Recognise why information security is critical to our business
- Know how and why information is classified
- Use email and the internet correctly
- Follow network access procedures
- Use portable media and portable devices correctly
- Be aware of physical security procedures
- Recognise how and when to report actual or suspected data breaches
Course Contents
- The importance of information security
- What is information security?
- What are the consequences of breaches?
- What do you think?
- Our Information Security Policy
- What information is covered?
- Information life cycle
- Information classification
- You make the call: Classifying information
- Email security
- Best practice for using emails
- Scenario: Alan's email
- Information security on the move
- Best practice for securing information when travelling
- Scenario: On vacation
- Scenario: Corinna's trip
- Using portable media
- Portable media: What should you do?
- Scenario: Using portable media
- Network access
- Access control: What should you do?
- Scenario: Jonathan's new job
- Password policy
- Password policy guidelines
- Scenario: Mark's Event
- Best practice for accessing the internet
- Scenario: The suspected hack
- Physical access
- Physical security measures
- What should you do?
- Scenario: Physical security
- Preventing information security breaches
- Reporting breaches
- You make the call: Report or not?
- Information security and the law
- Summary
- Assessment
Questions and answers
Reviews
Currently there are no reviews for this course. Be the first to leave a review.
Legal information
This course is advertised on reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.