COURSES
Legal Solutions

OUR COURSES SERIES
Legal Solutions Course Directory
Cybersecurity Data Protection and Privacy
| Course Name | Course Type | Syllabus |
|---|---|---|
| Data Protection and Device Security | Course | View details Course Syllabus | Print Syllabus Data Protection and Device SecurityOverview/Description: Employees play a key role in helping ensure the security of company data. Today’s technology and networking capabilities allow employees to work from virtually anywhere, but precautions are necessary to protect company assets and information. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c94_enus |
| Data Protection Short: BYOD | Course | View details Course Syllabus | Print Syllabus Data Protection Short: BYODOverview/Description: Employees who use their personal devices for work purposes must ensure they follow the employer’s “Bring Your Own Device” (BYOD) policy in order to protect the company’s network and resources. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c88_enus |
| Data Protection Short: Ensuring Physical Security | Course | View details Course Syllabus | Print Syllabus Data Protection Short: Ensuring Physical SecurityOverview/Description: Employees have a responsibility to protect personal and sensitive data in all forms. This course covers key best practices for physically securing data, whether you are in the office or offsite. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c83_enus |
| Data Protection Short: Insider Threats | Course | View details Course Syllabus | Print Syllabus Data Protection Short: Insider ThreatsOverview/Description: The prevalence of cybersecurity threats is on the rise, and a concerning number of them result from deliberately malicious behaviors of employees within organizations. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c85_enus |
| Data Protection Short: Preventing Data Loss and Theft | Course | View details Course Syllabus | Print Syllabus Data Protection Short: Preventing Data Loss and TheftOverview/Description: Employees play a key role in helping ensure data security and safety. This course covers best practices to help prevent data loss and theft. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c84_enus |
| Data Protection Short: Proper Document Disposal | Course | View details Course Syllabus | Print Syllabus Data Protection Short: Proper Document DisposalOverview/Description: Proper disposal of sensitive information when no longer needed, is essential for maintaining data security. This course covers best practices for safely and securely disposing of documents containing sensitive information. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c87_enus |
| Data Protection Short: Public and Home Wi-Fi Security | Course | View details Course Syllabus | Print Syllabus Data Protection Short: Public and Home Wi-Fi SecurityOverview/Description: Free Wi-Fi connections are available just about anywhere you go. But how do you distinguish the safe Wi-Fi networks from the risky ones? This course covers best practices for maintaining data security when using both public and home Wi-Fi networks. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c92_enus |
| Data Protection Short: Remote Working Concerns | Course | View details Course Syllabus | Print Syllabus Data Protection Short: Remote Working ConcernsOverview/Description: Today&;s technology and networking capabilities allows us to work from virtually anywhere, but additional precautions are necessary so your work is secure. This course covers best practices for working remotely to ensure you protect your organization&;s data and assets when doing so. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c89_enus |
| Data Protection Short: Reporting Data Theft | Course | View details Course Syllabus | Print Syllabus Data Protection Short: Reporting Data TheftOverview/Description: Employees play a key role in reporting security incidents. Swift reporting of even suspected data breaches can allow the company to investigate and minimize the damage of data loss. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c86_enus |
| Data Protection Short: Secure Printing | Course | View details Course Syllabus | Print Syllabus Data Protection Short: Secure PrintingOverview/Description: Printed documents can provide convenience and efficiency in your job, but it&;s important to print responsibly with an awareness of data security. This course covers best practices for safely and securely printing documents for work. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c93_enus |
| Data Protection Short: Security Patching | Course | View details Course Syllabus | Print Syllabus Data Protection Short: Security PatchingOverview/Description: Organizations need to respond quickly to security vulnerabilities to avoid cyberattacks and data loss, and security patching provides real-time response and mitigation. This course covers best practices employees can follow to ensure compliance with organizational patch security practices. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c90_enus |
| Data Protection Short: Using Mobile Devices Securely | Course | View details Course Syllabus | Print Syllabus Data Protection Short: Using Mobile Devices SecurelyOverview/Description: Company-issued mobile devices grant new freedoms to employees, allowing the flexibility to work from anywhere. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c82_enus |
| Data Protection Short: Working in Public Places | Course | View details Course Syllabus | Print Syllabus Data Protection Short: Working in Public PlacesOverview/Description: Although working remotely is an increasingly common practice in today&;s business environment, data security remains a vital concern when work is done outside of the office. This course covers best practices for working safely and securely in public places. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c91_enus |
| EU General Data Protection Regulation | Course | View details Course Syllabus | Print Syllabus EU General Data Protection RegulationOverview/Description: In today&;s data-driven society, corporate and non-profit organizations alike rely on the collection and processing of user data in ever-evolving ways. Employees working in these organizations share a duty to protect the rights of individuals&; personal data, which includes complying with the EU General Data Protection Regulation (GDPR). This course outlines the purpose and principles of this regulation. It explains obligations of controllers and processors under the GDPR, and discusses the rights of data subjects. The course also covers measures employees can take to support their organizations&; compliance with the GDPR.This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_e38_enus |
| Everyday Cybersecurity | Course | View details Course Syllabus | Print Syllabus Everyday CybersecurityOverview/Description: It&;s critical to be aware of the methods scammers may use to steal sensitive data from the organization where you work. A foundation of sound cybersecurity practices is essential for preventing data breaches and other security incidents that can have devastating results. When employees are empowered with knowledge of best practices and policies, they are an important line of defense against cyberattacks.This course was developed with subject matter support provided by KirkpatrickPrice. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_e52_enus |
| GDPR Compliance for Marketing | Course | View details Course Syllabus | Print Syllabus GDPR Compliance for MarketingOverview/Description: When conducting marketing activities, organizations must follow GDPR’s standards for collecting and using the personal information of customers and prospects. This course addresses compliance with the EU General Data Protection Regulation (GDPR) in the areas of: generating leads and collecting contact information; profiling and data enrichment; sending direct marketing messages; selling or sharing data; and ensuring the protection of individual rights.These course materials and content are for informational purposes only and do not constitute legal advice. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with any federal, state, or local laws. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship and is not intended to constitute legal advice or to substitute for obtaining legal advice from an attorney licensed in your state. Readers should not act upon this information without seeking professional counsel. The information contained herein is provided only as general information that may or may not reflect the most current legal developments. Course Number: lc_lchr01_d22_enus |
| GDPR Short: Generating Leads and Collecting Contact Details | Course | View details Course Syllabus | Print Syllabus GDPR Short: Generating Leads and Collecting Contact DetailsOverview/Description: Customers are the key to your company&;s success. When conducting marketing activities, you must follow laws and regulations pertaining to the information you collect and use about customers – both existing and potential. This course covers the key best practices for ensuring compliance with the EU General Data Protection Regulation (GDPR) when generating leads and collecting and using contact information.This course was developed with subject matter support provided by lnce Gordon Dadds LLP. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. lnce Gordon Dadds LLP accepts no responsibility for the contents of this course. Any reliance on the contents of this course as legal advice is prohibited and at the user’s risk. Transmission of the information is not intended to create, and receipt does not constitute, a solicitor-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_d16_enus |
| GDPR Short: Individual Rights | Course | View details Course Syllabus | Print Syllabus GDPR Short: Individual RightsOverview/Description: The GDPR specifies what companies can and cannot do with the personal information they collect and use while ensuring that individuals retain control over their personal information. This course covers the specific individual rights under the GDPR to help ensure personal data is protected.This course was developed with subject matter support provided by Ince Gordon Dadds LLP. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Ince Gordon Dadds LLP accepts no responsibility for their contents and the reliance on the contents is prohibited and at the user’s risk. Transmission of the information is not intended to create, and receipt does not constitute, a solicitor-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_d21_enus |
| GDPR Short: Online Advertising | Course | View details Course Syllabus | Print Syllabus GDPR Short: Online AdvertisingOverview/Description: The quantity of personal data available online provides nearly limitless marketing potential, but companies must ensure that their use of that data is legal. This course covers key best practices for ensuring your online marketing activities are GDPR-compliant. These course materials and content are for informational purposes only and do not constitute legal advice. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with any federal, state, or local laws. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship and is not intended to constitute legal advice or to substitute for obtaining legal advice from an attorney licensed in your state. Readers should not act upon this information without seeking professional counsel. The information contained herein is provided only as general information that may or may not reflect the most current legal developments. Course Number: lc_lchr01_d19_enus |
| GDPR Short: Profiling and Data Enrichment | Course | View details Course Syllabus | Print Syllabus GDPR Short: Profiling and Data EnrichmentOverview/Description: Collecting and using customer information to inform your marketing activities is a significant factor in remaining competitive, but you must do so in ways that respect your customers&; rights under the GDPR. This course covers key considerations to keep in mind when using profiling and enrichment services to ensure GDPR compliance.These course materials and content are for informational purposes only and do not constitute legal advice. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with any federal, state, or local laws. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship and is not intended to constitute legal advice or to substitute for obtaining legal advice from an attorney licensed in your state. Readers should not act upon this information without seeking professional counsel. The information contained herein is provided only as general information that may or may not reflect the most current legal developments. Course Number: lc_lchr01_d17_enus |
| GDPR Short: Selling or Sharing Data | Course | View details Course Syllabus | Print Syllabus GDPR Short: Selling or Sharing DataOverview/Description: Contact information, shopping habits, and product and service interests are hot commodities to marketers. But selling or sharing that information must be done appropriately and legally. This course covers key considerations for selling or sharing marketing data in compliance with the GDPR.These course materials and content are for informational purposes only and do not constitute legal advice. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with any federal, state, or local laws. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship and is not intended to constitute legal advice or to substitute for obtaining legal advice from an attorney licensed in your state. Readers should not act upon this information without seeking professional counsel. The information contained herein is provided only as general information that may or may not reflect the most current legal developments. Course Number: lc_lchr01_d20_enus |
| GDPR Short: Sending Direct Marketing Messages | Course | View details Course Syllabus | Print Syllabus GDPR Short: Sending Direct Marketing MessagesOverview/Description: Organizations rely heavily on direct marketing practices to keep customers coming back and to gain new ones. This course covers key considerations for sending GDPR-compliant marketing messages.These course materials and content are for informational purposes only and do not constitute legal advice. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with any federal, state, or local laws. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship and is not intended to constitute legal advice or to substitute for obtaining legal advice from an attorney licensed in your state. Readers should not act upon this information without seeking professional counsel. The information contained herein is provided only as general information that may or may not reflect the most current legal developments. Course Number: lc_lchr01_d18_enus |
| Global Internet Social Media and Electronic Communication | Course | View details Course Syllabus | Print Syllabus Global Internet Social Media and Electronic CommunicationOverview/Description: Regular use of the Internet and electronic communications is probably a way of life for you, as technology makes it easier to communicate with coworkers, clients, family, and friends. The near constant availability of e-mail, social and professional networking web sites, smartphones, and other tools has blurred the line between work and home to the point where your online activities at home may have an impact on your company and your employment. Most employers encourage staff to use the internet, electronic communication, and social media for business purposes, and possibly even allow a certain level of personal use in the workplace as well. For this reason, it&;s important to be familiar with your company&;s policy on these resources. This course provides background information to be considered in light of your own company&;s policies. You will learn about some generally accepted best practices for protecting your own and your company&;s best interests while using e-mail, instant messaging, and text messaging, as well as social networking sites and blogs. These course materials and content are for informational purposes only and do not constitute legal advice. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with any federal, state, or local laws. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship and is not intended to constitute legal advice or to substitute for obtaining legal advice from an attorney licensed in your state. Readers should not act upon this information without seeking professional counsel. The information contained herein is provided only as general information that may or may not reflect the most current legal developments. Course Number: lc_lchr01_b53_enus |
| India’s Digital Personal Data Protection Act | Course | View details Course Syllabus | Print Syllabus India’s Digital Personal Data Protection ActOverview/Description: India&;s new Digital Personal Data Protection Act (DPDPA) provides guidance for how personal data about anyone who resides, works, or is currently present in India may be collected and proecessed. In this course, you&;ll learn the general principles of the DPDPA, the rights and obligations under the Act, and best practices for compliance. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_e43_enus |
| Navigating Privacy Compliance | Course | View details Course Syllabus | Print Syllabus Navigating Privacy ComplianceOverview/Description: Many organizations collect individuals&; personal information for a variety of operational reasons. The information they collect, use, store, and share is a valuable asset to the organization. Employees, through careful adherence to the company’s privacy policies, play an important role in protecting the privacy of that information. This course was developed with subject matter support provided by KirkpatrickPrice. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_e78_enus |
| PCI Compliance Essentials | Course | View details Course Syllabus | Print Syllabus PCI Compliance EssentialsOverview/Description: This course is designed to provide point-of-sale employees with the essentials for protecting customer payment card information. Credit and debit card usage creates opportunities for fraud, theft, privacy violations, and counterfeiting. To ensure the safety of cardholder information, the Payment Card Industry has adopted a set of global data security standards (PCI DSS version 4.0) that merchants must adhere to in order to accept cards from card associations such as Visa, Discover, Mastercard, and American Express, as well as to be able to store, process, and transmit cardholder data. This course is meant to provide awareness training for end users of payment systems as per PCI DSS requirement 12.6.This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_d36_enus |
| Preventing Identity Theft | Course | View details Course Syllabus | Print Syllabus Preventing Identity TheftOverview/Description: More and more business and communication are happening online, leading to organizations holding a great deal of personally identifiable information (PII) about their clients and customers. This PII can make transactions easier, but if safety measures aren&;t taken, it can also give identity thieves an opportunity. This course will make you more aware of the risk of customers&; PII being used to steal their identities. You&;ll learn about precautions to keep PII safe and how to reduce the risk of malware or successful phishing attacks. Knowing some of the preventive measures to take can help safeguard both the client and your company as a whole.This course was developed with subject matter support provided by Baker, Donelson, Bearman, Caldwell & Berkowitz, PC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c53_enus |
| Privacy Concerns | Course | View details Course Syllabus | Print Syllabus Privacy ConcernsOverview/Description: Many organizations collect the personal information of their customers and prospects for a variety of commercial reasons. The information they collect, use, store, and share is a valuable asset to the organization. Employees, through careful adherence to the company’s privacy policies, play an important role in protecting the privacy of that information.This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c81_enus |
| Privacy Short: CCPA | Course | View details Course Syllabus | Print Syllabus Privacy Short: CCPAOverview/Description: The California Consumer Privacy Act, or CCPA, includes a number of important obligations for companies to which it applies. This course covers the criteria to determine if your company is subject to CCPA, as well as the regulations you and your company are obliged to comply with if CCPA applies. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c79_enus |
| Privacy Short: Following Company Policies and Procedures | Course | View details Course Syllabus | Print Syllabus Privacy Short: Following Company Policies and ProceduresOverview/Description: The information your company collects, uses, stores, and shares is a valuable asset to the organization, and the company’s data protection policies and procedures establish standards for working with that information. This course covers some key considerations that you should keep in mind for following your company&;s data protection policies and procedures. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c77_enus |
| Privacy Short: GDPR | Course | View details Course Syllabus | Print Syllabus Privacy Short: GDPROverview/Description: Organizations collect the personal information of their customers and prospects for a variety of commercial reasons. Companies serving customers in the European Union have particularly stringent legal obligations concerning the collection and use of personal information under the General Data Protection Regulation, or GDPR. This course provides an overview of consumers’ rights under the GDPR as well as the obligations imposed on companies that collect personal information. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c78_enus |
| Privacy Short: Personally Identifiable Information (PII) | Course | View details Course Syllabus | Print Syllabus Privacy Short: Personally Identifiable Information (PII)Overview/Description: Personally identifiable information, or PII, is subject to variety of legal protections that impact how companies can collect and use it. This course covers the different types of PII that you should be aware of and protect. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c76_enus |
| Privacy Short: Reporting Suspected Breaches | Course | View details Course Syllabus | Print Syllabus Privacy Short: Reporting Suspected BreachesOverview/Description: Personal information, if compromised, can result in significant damage to affected individuals. All employees have a key role to play in protecting personal information and other data they collect, manage, use, and store. This course covers best practices you should follow when you suspect a breach. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c80_enus |
| Securing Devices and Data | Course | View details Course Syllabus | Print Syllabus Securing Devices and DataOverview/Description: Robust security measures are crucial for protecting data integrity and privacy, preventing unauthorized access, and ensuring compliance with regulatory standards. Employees need to know how to effectively manage and secure data and the devices used to access that data.This course was developed with subject matter support provided by KirkpatrickPrice. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_e65_enus |
| Security Awareness for End Users | Course | View details Course Syllabus | Print Syllabus Security Awareness for End UsersOverview/Description: The nature of higher education institutions means they must provide relatively open and easy access to resources and services while also protecting these resources from individuals with malicious intentions. Securing the campus network depends largely on end users – specifically students and employees. They have an important role to play in network security. In fact, by taking appropriate action to promote network security, end users will also benefit from increased protection against people looking to take advantage or exploit them personally. This course will explore why campus networks are targeted by hackers and the potential consequences a breach can have for end users and institutions. Best practices for protecting personal, web-enabled devices and safe online behaviors will build awareness of how to stay safe and secure online – which in turn will promote campus network security.This course was developed with subject matter support provided by the Labor, Employment, and Employee Benefits Law Group of the law firm of Sheehan Phinney Bass & Green PA. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with any federal, state, or local laws. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking professional counsel. The information contained herein is provided only as general information that may or may not reflect the most current legal developments. This information is not provided in the course of an attorney-client relationship and is not intended to constitute legal advice or to substitute for obtaining legal advice from an attorney licensed in your state. Course Number: lc_lchr01_d43_enus |
| Virginia Consumer Data Protection Act | Course | View details Course Syllabus | Print Syllabus Virginia Consumer Data Protection ActOverview/Description: The Virginia Consumer Data Protection Act (VCDPA) establishes personal data privacy rights for Virginia residents. Among other things, it requires for-profit companies (that are not subject to GLB or HIPAA) that collect and process personal data must ensure individuals&; rights to access, correct, and delete their data. It also requires individuals be notified of the data being collected, and be given the chance to opt-out of the sale and processing of their personal information for targeted advertising purposes. This course provides a high-level overview of the VCDPA for general employees of data controllers and data processors. It will help them understand the purpose and provisions of the law so they can apply the policies and procedures their employer has developed for VCDPA compliance, and aid them in spotting potential violations as they go about their day-to-day work.This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_d52_enus |
| California Consumer Privacy Law – CCPA & CPRA | Course | View details Course Syllabus | Print Syllabus California Consumer Privacy Law – CCPA & CPRAOverview/Description: The California Consumer Privacy Act (“CCPA”) created an array of consumer privacy rights and business obligations with regard to the collection and sale of personal information. The California Privacy Rights Act (“CPRA”) expanded data privacy rights previously established by the CCPA. Together, they constitute California consumer privacy law. Many companies will be subject to California consumer privacy law directly; others will need to understand its terms either because they provide services to businesses subject to California consumer privacy law, or because they employ individuals protected by California consumer privacy law. In this course, you will learn about the types of businesses and information that are covered by the law, the rights of consumers under the law, and the obligations imposed on businesses covered by California consumer privacy law.This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_d73_enus |
| China’s Personal Information Protection Law (PIPL) | Course | View details Course Syllabus | Print Syllabus China’s Personal Information Protection Law (PIPL)Overview/Description: The China Personal Information Protection Law (PIPL) is China’s most comprehensive data protection regulation. As data becomes an increasingly important part of many business operations, the personal information and data of individuals is a both a valuable commodity and a massive responsibility to protect. Employees working for organizations that use personal information share a duty to protect the rights of individuals&; personal data, which includes complying with the PIPL. This course outlines the purpose and principles of this regulation. It defines personal information processors, and describes the rights of individuals under the law. The course also describes measures employees can take to support their organizations&; compliance with the PIPL.This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_e42_enus |
| Colorado Privacy Act | Course | View details Course Syllabus | Print Syllabus Colorado Privacy ActOverview/Description: The Colorado Privacy Act (CPA) establishes personal data privacy rights and directs certain companies (defined as &;controllers&; under the Act) to fulfill duties related to consumers&; assertion of their rights, transparency, purpose specification, data minimization, avoiding secondary use, care, avoiding unlawful discrimination, and handling of sensitive data.This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_d51_enus |
| Controlled Unclassified Information | Course | View details Course Syllabus | Print Syllabus Controlled Unclassified InformationOverview/Description: Employees of a private-sector federal contractor are required by law to control unclassified information – to protect that information from unauthorized users and to ensure the confidentiality and availability thereof to the right people. In this course, you&;ll learn how to identify the Controlled Unclassified Information (CUI) your organization holds. You&;ll also learn with whom you can share CUI and how to mark CUI in documents. Finally, you&;ll learn how to safeguard CUI in the physical and electronic environment to prevent unauthorized access.This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_b91_enus |
| Cybersecurity and Online Habits | Course | View details Course Syllabus | Print Syllabus Cybersecurity and Online HabitsOverview/Description: Sound cybersecurity practices are essential for preventing data breaches and other security incidents that can have devastating consequences for organizations. Employees, through the careful adherence to their company’s IT policies, form an important line of defense against cyberattacks. This course focuses on common pitfalls in IT security by end users and provides employees with common sense guidelines for managing cybersecurity risks. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c75_enus |
| Cybersecurity Short: Avoiding Phishing Attacks | Course | View details Course Syllabus | Print Syllabus Cybersecurity Short: Avoiding Phishing AttacksOverview/Description: Every networked device we carry and use each day is a potential entry point for scammers to access sensitive information. In today&;s digitally connected environment it&;s critical to be aware of methods scammers use, and ways to protect both yourself and your organization&;s data. This short course covers the different types of phishing attempts that you may encounter, how they work, and what you can do to help ensure you don&;t become a victim to one. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c63_enus |
| Cybersecurity Short: Blogging | Course | View details Course Syllabus | Print Syllabus Cybersecurity Short: BloggingOverview/Description: Blogging is a great forum for sharing your opinions, knowledge, and life experience, but there are factors to consider to avoid causing problems for yourself and your employer. This course covers the risks associated with unsafe blogging practices, and actions you can take to ensure safe blogging for both yourself and your company. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c72_enus |
| Cybersecurity Short: Professional Social Networking | Course | View details Course Syllabus | Print Syllabus Cybersecurity Short: Professional Social NetworkingOverview/Description: Social media provides new and exciting ways for individuals to interact with the world, but it adds a new dynamic to how others may view you and those connected to you – including your employer. This course covers key best practices for safe social networking use, including considerations to make to ensure no negative impacts to your reputation, or that of your employer, through your social media activities. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c68_enus |
| Cybersecurity Short: Proper Password Management | Course | View details Course Syllabus | Print Syllabus Cybersecurity Short: Proper Password ManagementOverview/Description: Digital passwords are the first line of defense for your company&;s data and information systems. Yet poor password security practices are all too common. This course covers best practices for creating secure passwords, and guidelines for safe password management. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c66_enus |
| Cybersecurity Short: Proper Use of E-mail | Course | View details Course Syllabus | Print Syllabus Cybersecurity Short: Proper Use of E-mailOverview/Description: E-mail is the most common form of business communication today, yet it&;s also the easiest way hackers gain access and compromise company systems and networks. This course covers key best practices for safe e-mail use, so that you can mitigate, rather than introduce, security risks to your company&;s assets. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c67_enus |
| Cybersecurity Short: Proper Use of the Internet at Work | Course | View details Course Syllabus | Print Syllabus Cybersecurity Short: Proper Use of the Internet at WorkOverview/Description: Whether it&;s browsing on your mobile device at lunch or performing work-related tasks online, you most likely spend at least some of your workday on the Internet. This course covers key best practices for properly using the Internet at work to help keep both you and your company secure and productive. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c73_enus |
| Cybersecurity Short: QR Code Risks | Course | View details Course Syllabus | Print Syllabus Cybersecurity Short: QR Code RisksOverview/Description: As QR codes become more visible and used by businesses, it’s important to be aware of security risks associated with them. This course will describe how QR codes can be risky and what to look out for to reduce that risk.This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_d81_enus |
| Cybersecurity Short: Smart Downloading | Course | View details Course Syllabus | Print Syllabus Cybersecurity Short: Smart DownloadingOverview/Description: Whether it&;s on your personal device or a company-issued system, when you add, update, or enhance a feature or application, you&;re most likely downloading the software to do it. This short course covers smart downloading and file sharing best practices you can use to reduce malware risks. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c64_enus |
| Cybersecurity Short: The Virtual Meeting – Doing It Right | Course | View details Course Syllabus | Print Syllabus Cybersecurity Short: The Virtual Meeting – Doing It RightOverview/Description: As more companies shift operations to virtual environments, employees need to understand how to conduct business meetings safely. This course covers best practices for using virtual meeting applications so you can conduct your work-related communications in a secure virtual environment. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c99_enus |
| Cybersecurity Short: Using a Virtual Private Network (VPN) | Course | View details Course Syllabus | Print Syllabus Cybersecurity Short: Using a Virtual Private Network (VPN)Overview/Description: This course covers the benefits and best practices for using a VPN connection to help secure your company’s network. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c74_enus |
| Cybersecurity Short: Using IM and Text Messaging | Course | View details Course Syllabus | Print Syllabus Cybersecurity Short: Using IM and Text MessagingOverview/Description: Instant and text messaging applications are incredibly convenient for communicating with others. But just like other technology-based communication methods, there are security and privacy risks to manage with best practices. This course covers key considerations you should make when using IM and text messaging to help protect your company, your recipient, and yourself. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c69_enus |
| Cybersecurity Short: Using Online Security Features | Course | View details Course Syllabus | Print Syllabus Cybersecurity Short: Using Online Security FeaturesOverview/Description: Unsafe online practices can put an entire company&;s network and infrastructure in jeopardy. Even though most online security features are managed by corporate IT departments, employees still play a critical role in protecting company systems and data. This course covers best practices for using online security features such as anti-virus and anti-malware software, VPNs, and firewalls. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice. Course Number: lc_lchr01_c65_enus |