Skip to content
English
  • There are no suggestions because the search field is empty.

Compliance Basics Collection

Compliance Basics

ComplianceBasics_ClientMarketingFlyer_8-5x11_THUMBNAILAudience: General End User (All)
Difficulty Level: Foundational
Time: 8 modules, 1-2 minutes each + 3 Questions per module
Availability: Available on Training as individual modules. Do not need to be assigned or watched together, designed to stand independently.
Modules: 

  • Compliance Basics: CCPA (1:12 Video)
  • Compliance Basics: Data Privacy (1:35 Video)
  • Compliance Basics: GDPR (1:51 Video)
  • Compliance Basics: HIPAA (1:22 Video)
  • Compliance Basics: PCI (1:30 Video)
  • Compliance Basics: PHI (1:49 Video)
  • Compliance Basics: PII (1:41 Video)
  • Compliance Basics: PIPEDA (1:09 Video)

Sample Video: Compliance Basics - Data Privacy

Marketing Materials: Compliance Basics Marketing Kit



Major Themes: Compliance with legal regulations can seem complicated, but it doesn’t have to be. Introduce common compliance and regulation topics with these short, easy to understand training modules.

Major Learning Concepts:
  • Compliance Basics: CCPA
    • Who is protected
    • Rights granted
    • Minimizing what data is collected
    • Minimizing exposure to personal data
    • Reporting mishandling of private data
  • Compliance Basics: Data Privacy
    • Data collected by organizations
    • Selling of personal data
    • License agreements
    • Privacy settings
  • Compliance Basics: GDPR
    • Who is protected
    • Cookies
    • Permission to collect personal data
    • Reporting data leaks
    • Right to request deletion of personal data
    • Fines for noncompliance
  • Compliance Basics: HIPAA
    • Who is protected
    • PHI
    • Sharing of PHI
    • Password protecting devices
    • Reporting lost and stolen devices
    • Proper disposal of PHI
  • Compliance Basics: PCI
    • Cardholder sensitive data
    • Credit card fraud
    • Proper handling of credit card numbers
    • Disposal of physical documents
    • Encrypted email
  • Compliance Basics: PHI
    • Definition of PHI
    • Sensitive information
    • Consequences of stolen PHI
    • Shoulder surfing
    • Locking unattended devices
    • Oversharing
    • Reporting suspicious activity
  • Compliance Basics: PII
    • Definition and examples of personally identifiable information
    • Cybercriminals’ uses for PII
    • Oversharing
    • Limiting what PII is collected
    • Disposing of PII
    • Reporting leaking of PII
  • Compliance: PIPEDA
    • Who is protected
    • Rights granted
    • Sensitive information
    • Reporting mishandling of personal information

🔍 View Compliance Basics in your Living Security platform catalog here!