Register Account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
WISP Training
#1
WISP Training

[Image: e563c0f08d2b9d05f0029312ce969da8.jpeg]

Published 10/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.07 GB | Duration: 0h 54m

For compliance with WISP

What you'll learn
Understand what the Written Information Security Plan is
Understand and discuss Personally Identifiable Information (PII)
Understand standard policies and procedures to comply with the WISP
Identify employees/contractors needing WISP compliance training
Complete WISP training: employees and contractors
Requirements
This course requires the ability to view and download content from a website
Works on Linux, Windows, iphone, Android, or Mac
Description
This course is directed at anyone interested in complying with WISP training for those who have access to personal identifiable information. This course covers the topics and attestation of signed documents for your organization. The system does not allow upload of documents but does offer attestation the documents are signed.Signed documents must be handled per your company policy for record keeping. See your designated security officer for more information. Certification of completed training on Udemy is provided, but record keeping is done per your organization requirements. This course serves as a general training for compliance with WISP requirements. Specific procedures for your firm will need to be presented in addition to this training. This can be in the form of handout, presentation or documentation supplied by your company through a variety of delivery channels. The training includes:Information about WISPIdentified officers in the organization/firm.Policy sections and documents (separate and consolidated)Safety measuresGeneral procedures for print or electronic documentsThe written information security plan is a current requirement for anyone working with personally identifiable information or PII. Annual training is a requirement for employees or contractors working at these companies. The designated security coordinator is responsible for making sure everyone who is required, completes this training annually. Any new procedures will be presented each year. The employee or contractor is presented an acknowledgement letter. The completion of the training presented by the DSC, with any additional policy and procedure information presented by your company to the learner can be presented as annual WISP training. Remember to include "specific" policies and procedures to your employees in addition to this training.This training is a base and more specific information, if applicable, is needed for your learners. The course was developed by Marcia K Wilbur, privacy advocate. Her experience in privacy includes working with the US Department of Education and the Arizona Department of Education in creating FERPA training to protect student personal identifiable information. In 2019 Marcia spoke at Yale Law school about privacy. Recently, she spoke at HOPE 2024 in New York about privacy policies and maintains dirtyTOS, sharing information about privacy matters.
Overview
Section 1: Introduction
Lecture 1 Introduction
Lecture 2 What is WISP?
Lecture 3 Define the WISP objectives, purpose, and scope
Section 2: Responsible Individuals
Lecture 4 Data Security Coordinator
Lecture 5 Public Information Officer
Section 3: Risk Mitigation Policies
Lecture 6 PII Collection and Retention Policy
Lecture 7 Personnel Accountability Policy
Lecture 8 PII Disclosure Policy
Lecture 9 Reportable Event Policy
Section 4: External Policies
Lecture 10 Network Protection Policy
Lecture 11 Firm User Access Control Policy
Lecture 12 Electronic Exchange of PII Policy
Lecture 13 Wi-Fi Access Policy
Lecture 14 Remote Access Policy
Lecture 15 Connected Devices Policy
Lecture 16 Information Security Training Policy
Section 5: Additional Resources
Lecture 17 Retention Specific to your organization
Lecture 18 See your company specifics
Lecture 19 Hardware records
Lecture 20 Firm Employees Authorized to Access PII
Lecture 21 Conduct Safeguarding and Rules of Behavior
Lecture 22 Security Breach Procedures and Notifications
Lecture 23 Non-Disclosure agreement
Section 6: Acknowlegement
Lecture 24 Signing the Acknowledgement instructions
This course audience is employees, new hires, and consultants working with Personally Identifiable Information.
Screenshots

[Image: 54b90de9bd35d10e03c2ebab09ae6240.jpeg]

Say "Thank You"

rapidgator.net:

[To see links please register or login]


ddownload.com:

[To see links please register or login]

Reply


Download Now



Forum Jump:


Users browsing this thread:
1 Guest(s)

Download Now