Compliance Basics Collection
Compliance Basics
Audience: General End User (All)
Difficulty Level: Foundational
Time: 8 modules, 1-2 minutes each + 3 Questions per module
Availability: Available on Training as individual modules. Do not need to be assigned or watched together, designed to stand independently.
Modules:
- Compliance Basics: CCPA (1:12 Video)
- Compliance Basics: Data Privacy (1:35 Video)
- Compliance Basics: GDPR (1:51 Video)
- Compliance Basics: HIPAA (1:22 Video)
- Compliance Basics: PCI (1:30 Video)
- Compliance Basics: PHI (1:49 Video)
- Compliance Basics: PII (1:41 Video)
- Compliance Basics: PIPEDA (1:09 Video)
Sample Video: Compliance Basics - Data Privacy
Marketing Materials: Compliance Basics Marketing Kit
Major Themes: Compliance with legal regulations can seem complicated, but it doesn’t have to be. Introduce common compliance and regulation topics with these short, easy to understand training modules.
- Compliance Basics: CCPA
- Who is protected
- Rights granted
- Minimizing what data is collected
- Minimizing exposure to personal data
- Reporting mishandling of private data
- Compliance Basics: Data Privacy
- Data collected by organizations
- Selling of personal data
- License agreements
- Privacy settings
- Compliance Basics: GDPR
- Who is protected
- Cookies
- Permission to collect personal data
- Reporting data leaks
- Right to request deletion of personal data
- Fines for noncompliance
- Compliance Basics: HIPAA
- Who is protected
- PHI
- Sharing of PHI
- Password protecting devices
- Reporting lost and stolen devices
- Proper disposal of PHI
- Compliance Basics: PCI
- Cardholder sensitive data
- Credit card fraud
- Proper handling of credit card numbers
- Disposal of physical documents
- Encrypted email
- Compliance Basics: PHI
- Definition of PHI
- Sensitive information
- Consequences of stolen PHI
- Shoulder surfing
- Locking unattended devices
- Oversharing
- Reporting suspicious activity
- Compliance Basics: PII
- Definition and examples of personally identifiable information
- Cybercriminals’ uses for PII
- Oversharing
- Limiting what PII is collected
- Disposing of PII
- Reporting leaking of PII
- Compliance: PIPEDA
- Who is protected
- Rights granted
- Sensitive information
- Reporting mishandling of personal information
🔍 View Compliance Basics in your Living Security platform catalog here!