WISP Training - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: WISP Training (/Thread-WISP-Training) |
WISP Training - mitsumi - 10-15-2024 WISP Training Published 10/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 2.07 GB | Duration: 0h 54m For compliance with WISP What you'll learn Understand what the Written Information Security Plan is Understand and discuss Personally Identifiable Information (PII) Understand standard policies and procedures to comply with the WISP Identify employees/contractors needing WISP compliance training Complete WISP training: employees and contractors Requirements This course requires the ability to view and download content from a website Works on Linux, Windows, iphone, Android, or Mac Description This course is directed at anyone interested in complying with WISP training for those who have access to personal identifiable information. This course covers the topics and attestation of signed documents for your organization. The system does not allow upload of documents but does offer attestation the documents are signed.Signed documents must be handled per your company policy for record keeping. See your designated security officer for more information. Certification of completed training on Udemy is provided, but record keeping is done per your organization requirements. This course serves as a general training for compliance with WISP requirements. Specific procedures for your firm will need to be presented in addition to this training. This can be in the form of handout, presentation or documentation supplied by your company through a variety of delivery channels. The training includes:Information about WISPIdentified officers in the organization/firm.Policy sections and documents (separate and consolidated)Safety measuresGeneral procedures for print or electronic documentsThe written information security plan is a current requirement for anyone working with personally identifiable information or PII. Annual training is a requirement for employees or contractors working at these companies. The designated security coordinator is responsible for making sure everyone who is required, completes this training annually. Any new procedures will be presented each year. The employee or contractor is presented an acknowledgement letter. The completion of the training presented by the DSC, with any additional policy and procedure information presented by your company to the learner can be presented as annual WISP training. Remember to include "specific" policies and procedures to your employees in addition to this training.This training is a base and more specific information, if applicable, is needed for your learners. The course was developed by Marcia K Wilbur, privacy advocate. Her experience in privacy includes working with the US Department of Education and the Arizona Department of Education in creating FERPA training to protect student personal identifiable information. In 2019 Marcia spoke at Yale Law school about privacy. Recently, she spoke at HOPE 2024 in New York about privacy policies and maintains dirtyTOS, sharing information about privacy matters. Overview Section 1: Introduction Lecture 1 Introduction Lecture 2 What is WISP? Lecture 3 Define the WISP objectives, purpose, and scope Section 2: Responsible Individuals Lecture 4 Data Security Coordinator Lecture 5 Public Information Officer Section 3: Risk Mitigation Policies Lecture 6 PII Collection and Retention Policy Lecture 7 Personnel Accountability Policy Lecture 8 PII Disclosure Policy Lecture 9 Reportable Event Policy Section 4: External Policies Lecture 10 Network Protection Policy Lecture 11 Firm User Access Control Policy Lecture 12 Electronic Exchange of PII Policy Lecture 13 Wi-Fi Access Policy Lecture 14 Remote Access Policy Lecture 15 Connected Devices Policy Lecture 16 Information Security Training Policy Section 5: Additional Resources Lecture 17 Retention Specific to your organization Lecture 18 See your company specifics Lecture 19 Hardware records Lecture 20 Firm Employees Authorized to Access PII Lecture 21 Conduct Safeguarding and Rules of Behavior Lecture 22 Security Breach Procedures and Notifications Lecture 23 Non-Disclosure agreement Section 6: Acknowlegement Lecture 24 Signing the Acknowledgement instructions This course audience is employees, new hires, and consultants working with Personally Identifiable Information. Screenshots Say "Thank You" rapidgator.net: ddownload.com: |