Training Course Finder

Privacy and Security

Privacy Resources

PRIVACY + SECURITY TRAINING COURSE FINDER

PRIVACY DATA SECURITY
FERPA HIPAA
VIGNETTES WHITEBOARDS

 

Privacy

Primary Courses

Global Privacy and Data Protection (25 min, 15 min)
Global Privacy and Data Protection (30 min, 25 min, 20 min, 15 min and 12 min)
Global Privacy and Data Protection (25 min) for IT
Privacy and Data Security
Dimensions of Data Privacy
Privacy Awareness 
Privacy By Design

GDPR and EU Data Protection

GDPR Training (20 min, 7 min)
European Union Privacy Law

United States Federal Privacy Laws

FTC Act Section 5
United States Privacy Law
Privacy Act for Federal Contractors
Gramm-Leach-Bliley Act
Children’s Online Privacy Protection Act (COPPA)

United States State Privacy Laws

Biometric Privacy Laws
U.S. State Consumer Privacy Laws
California Consumer Privacy Act (CCPA) (15 min, 10 min)
California Consumer Privacy Act (CCPA) Interactive Whiteboard
California Health Privacy
Colorado Privacy Act (CPA)
Texas Health Privacy
Virginia’s Consumer Data Protection Act (CDPA)
Washington My Health My Data Act (MHMDA)

 

Worldwide Privacy Laws

Asia Pacific: Privacy Law in Asia-Pacific
Australia’s Privacy Act
Brazil: LGPD
Brazil: LGPD Interactive Whiteboard
Canada: PIPEDA
China: PIPL (20 min, 5.5 min)
Colombia: GPDPL
Hong Kong: PDPO
India: Digital Personal Data Protection Act
Japan: APPI
Latin America: Privacy Law in Latin America
Mexico: Federal Privacy Law
South Korea: PIPA
Singapore: PDPA
Turkey: LPPD
Global Privacy Law

General Privacy Topics

Privacy, Risk and Trust
Nothing to Hide: Why Privacy Matters
Importance of Protecting Personal Data
Defining Personal Information
What Is Personal Data?
Sensitive Data
Privacy Principles
The Relationship Between Privacy and Security

Role-based Topics

Telemarketing and the TCPA
Texting and the TCPA
Emailing and the CAN-SPAM Act
Canadian Anti-Spam Legislation (CASL)
Privacy in Online Advertising
Financial Privacy Overview
FTC Red Flags Rule
Dark Patterns
Vendor Management: Sharing Data with Third Parties
Online Social Media (15 min, 10 min)
Working from Home
Ethical Duties of Data Protection in Legal Practice
Threats and Vulnerabilities
The Costs of Violations

Artificial Intelligence

Artificial Intelligence
Technology and Data Ethics

Data Management

Data Mapping
Data Minimization
Data Protection Impact Assessments
Data Retention
Data Subject Requests
Life Cycle of Personal Data
Secondary Uses

Back to top

Data Security

Primary Data Security

Data Security Awareness (30 min, 20 min, 10 min)
Privacy and Data Security

Data Security, Security

Ransomware
Working from Home
Five Key Points for Data Security
Phishing, Illustrated (12 min, 6 min)
Phishing, non-illustrated
Avoiding Phishers, Hackers and Social Engineers
Social Engineering
Social Engineering: Spies & Sabotage

Data Security, Best Practices

Data Security Overview
Humans are the Biggest Data Security Risk
Passwords
Portable Devices and Remote Access
Websites and Software
Malware
Email
Physical Access
Encryption
Data Disposal
Data Breach

Data Security, Importance

Relationship Between Privacy and Security
Threats and Vulnerabilities
Threats and Vulnerabilities for Law Firms
Cost of Violations
Cost of Violations for Law Firms

Back to top

FERPA

FERPA for Higher Education (30 min, 15 min)
FERPA for K-12 Education
FERPA Interactive Whiteboard
Cloud Computing in Education

Back to top

HIPAA

HIPAA Privacy for Covered Entities

HIPAA Overview
HIPAA Privacy for CEs (10 min, 20 min, 30 min)
HIPAA Privacy and Security
Medicare: Preventing Fraud, Waste, and Abuse

HIPAA Privacy for Business Associates

HIPAA Privacy for BAs (7 min, 20 min, 30 min)
HIPAA Overview for Law Firms

HIPAA Security

HIPAA Security for CEs and BAs (30 min, 20 min, 10 min)

HIPAA Short Topics

HIPAA and Health Privacy
Protected Health Information (PHI)
Confidentiality
Snooping
Minimum Necessary Rule
Disclosures
Individual Rights
Authorization
Accounting for Disclosures
Enforcement
Business Associates
Psychotherapy Notes
The HITECH Act
Health Privacy: HIPAA and Beyond
Humans Are the Biggest Safety Risk
Social Engineering: Spies and Sabotage
Social Engineering
Passwords
Website and Software
Email
Malware
Physical Access
Portable Devices and Remote Access
Encryption
Data Disposal
Data Breach
De-Identification
Research
Social Media for Healthcare (15 min, 10 min)

Back to top

VIGNETTES

Vignette – The Rude Refrigerator
Vignette – The Inquisitive Interrogator: A Data Minimization Story
Vignette – Facebook and the Mysterious Blue Disease
Vignette – The App from Hell
Vignette – The Data Misuse Nightmare
Vignette – The Password Borrower
Vignette – Ransomware Attack
Vignette – Taking Devices for a Drive
Vignette – The Laptop That Traveled the World
Vignette – The Thumb Drive Discovery
Vignette – The Email From the IT Department
Vignette – The Snooper
Vignette – The Forsaken Workstation
Vignette – The Celebrity’s Hand
Vignette – The Concerned Meddlers
Spot the Risks: Privacy & Security Game
Spot the Risks: HIPAA Privacy & Security Game
Spot the Risks: Privacy & Cybersecurity Game
Secure Workspaces Game

Back to top

WHITEBOARDS

U.S. Privacy Laws

Children’s Online Privacy Protection Act (COPPA)
Family Educational Rights and Privacy Act (FERPA)
FTC Section 5
Health Insurance Portability and Accountability Act (HIPAA)
CAN-SPAM Act
Telemarketing Consumer Protection Act (TCPA)

U.S. State Privacy Laws

Biometric Privacy Laws
US State Consumer Privacy Laws
Data Security
California Consumer Privacy Act (CCPA)
Colorado Privacy Act (CPA)
Connecticut Data Privacy Act
Delaware Personal Privacy Act
Florida Digital Bill of Rights
Indiana Consumer Data Protection Act
Iowa Consumer Data Protection Act
Montana Consumer Data Privacy Act
New Jersey Privacy Act
New York Shield Act
Oregon Consumer Privacy Act
Tennessee Data Privacy and Security Act
Texas Data Privacy and Security Act
Utah Consumer Privacy Act
Virginia Consumer Data Protection Act (CDPA)
Washington My Health My Data Act (MHMDA)

United States and Canada

United States
Canada

Latin America

Argentina
Aruba
Brazil
Bolivia
Chile
Colombia
Costa Rica
Dominican Republic
Ecuador
El Salvador
Guatemala
Honduras
Jamaica
Mexico
Nicaragua
Panama
Paraguay
Peru
Trinidad and Tobago
Uruguay
Venezuela

Asia-Pacific

Australia
Cambodia
China
Hong Kong
India
Indonesia
Japan
Kazakhstan
Kyrgyzstan
Macau
Malaysia
Mongolia
New Zealand
Philippines (DPA)
Singapore
South Korea
Taiwan
Thailand
Uzbekistan
Vietnam

Europe

GDPR
Armenia
Azerbaijan
Belarus
Bosnia Herzegovina
Georgia
Kosovo
Moldova
Montenegro
North Macedonia
Russia
Serbia
Switzerland
Turkey
Ukraine
United Kingdom

Africa

Ghana
Eswatini
Israel
Lebanon
Lesotho
Namibia
South Africa
Zambia

Back to top
Divider 02

Please Contact Us If You Are Interested In
Privacy or Security Training

We can provide you with a login so you can evaluate the programs. Click here for our catalog.

    First Name

    Last Name

    Organization

    Title

    E-mail

    Phone No.

    Address

    Please tell us about your training needs

    PROFESSOR SOLOVE'S NEWSLETTER
    Professor Solove’s newsletter covers his latest writings, events, and training. It is sent weekly.
    You can unsubscribe at any time. Click to see a sample issue.
    Would you be interested in subscribing?
    YesNoAlready Subscribed