Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
A brief overview of South Africa's information security, cybersecurity and cybercrime legal landscape
Social media can be an excellent tool to connect and interact with customers show thought leadership and build a brand but it also poses unique security HR and public relations challenges
This 10 minute video course explains what cybersecurity measures can be taken by individuals and organisations to help prevent a cyber attack
The purpose of this course is to familiarize you with the California Consumer Privacy Act (CCPA), who the law protects, what businesses are required to do, and your responsibility as an employee of a company that collects consumers’ personal information (PI)
This course provides training for staff of companies that deal with personal data on Californian residents or that do business in California
Does the new California Consumer Privacy Act apply to you? If you have customers in California, then yes, you may need to comply with the law
If you do business in California, and you collect data on your customers, as most businesses do, then a new privacy law applies to you
This 30-minute course introduces managers and employees to the basics of the California Consumer Privacy Act and the California Privacy Rights Act and helps them understand the rights, duties and obligations these laws create and how they impact California consumers and the organizations that do business in California
This course provides an overview of China's newly enacted Data Security Law, which establishes the basic framework of China's data security system and regulates a wide range of issues on data security
Poorly kept information can quickly become lost or stolen when it is left unattended
The aim of this module is to provide you with a high level summary of each of the APPs to ensure you are familiar with the key compliance requirements with which your company is required to comply along with providing a high level overview of other key laws relating to privacy
8 conditions for compliance with POPIA
In this Cyber Security Awareness course, we cover Cyber Security non-technical and give practical information on the most common Cyber Security risks
With today's wide range of threats, it is a must to ensure minimum standards of security
In this course, we will discuss a range of data privacy, information security and asset protection concepts
Organizations that handle "personal information" should implement certain safeguards to protect that information against identity theft and other misuse
The purpose of this course is to provide awareness about data privacy best practices and the risks associated with mishandling personal data
The dramatic increase in the use of personal information — and the risks associated with that use — have resulted in the introduction of data protection laws across the world
This course cover best practices for handling information at the first and last stages of the data lifecycle which is the life of a record from creation through destruction within our organisation
This 20-minute interactive course explains the key concepts and guidelines for appropriately handling student information protected under the Family Educational Rights and Privacy Act
This course explains to employees the most important elements of the Gramm-Leach-Bliley Act (GLBA), which imposes information-privacy protection requirements on banks, securities firms, insurance companies and other providers of financial products and services
This course will provide the learner with an introduction to the Gramm-Leach-Bliley Act (GLBA) and its various aspects regarding information privacy and security
HIPAA (Health Insurance, Portability, and Accountability Act) isn’t just for doctors in lab coats
Compliance with the HIPAA law is essential for any business that comes in contact with protected health information (PHI)
The following Cybersecurity & HIPAA Overview Training for Healthcare Personnel (HCP) is designed to educate employees and management how to be compliant with the Health Insurance Portability and Accountability Act (HIPAA) while outlining the privacy and security laws that prevent security breaches and ultimately, keep patient information safe from cyber attacks
This course is designed to help you achieve a general awareness of the HIPAA requirements pertaining to the disposal of protected health information (PHI)
The following HIPAA Training For Healthcare Providers course is designed to educate healthcare providers (HCP) and management on how to be compliant with the Health Insurance Portability and Accountability Act (HIPAA)
The following HIPAA Training for Dental Healthcare Providers course is designed to educate dental healthcare providers (DHCP) on how to be compliant with the Health Insurance Portability and Accountability Act (HIPAA)
With the growth of digital technology and the shifting legal and regulatory landscape, respecting and protecting patient privacy is essential for preventing fraud and abuse
HIPAA
As a quick review, HIPAA passed through Congress in 1996 as a broad attempt at health care reform
The Health Insurance Portability and Accountability Act is designed to protect patient health information, so a great deal of the act's content is dedicated to outlining how and when covered entities can disclose protected health information
The Health Insurance Portability and Accountability Act greatly impacts how covered entities can market their products and services to patients
The Health Insurance Portability and Accountability Act is a lengthy and arguably cumbersome maze of rules and requirements
The Health Insurance Portability and Accountability Act, or HIPAA, is a big topic
The Health Insurance Portability and Accountability Act is designed to protect patients
The Health Insurance Portability and Accountability Act is designed to protect patient health information, so a great deal of the act's content is dedicated to outlining how and when covered entities can disclose protected health information, or PHI
As an emergency responder, you're engaging with patients during some of the most vulnerable times in their lives
One of the most significant changes in the health care landscape is the ability to use genetic information to determine a patient's risk of developing certain conditions or illness
1 2 3 4 5 6 7 Next