Course Details

Previous Page


Privacy and Information Security


Overview/Description
Target Audience
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Information about individuals is used by businesses to provide customers with a huge array of targeted goods and personalized services that consumers have come to expect. If it lands in the wrong hands, this same information can result in harm to the very individuals it was meant to serve. The protection of an individual's personal information has business implications that extend beyond the privacy of any one individual. Private information relative to certain businesses and industries is protected by various laws. At present, there is no broad, general federal law protecting the privacy of customer information; most protections are aimed at particular types of information (such as medical or student records, for example) or particular types of businesses (such as healthcare and financial services providers, for example). Customers and consumers expect their information to be protected; businesses that recognize the need to make privacy part of their business strategy, are ahead of the game. However, the ability of a business to protect private information it collects as part of its business is only as strong as its weakest link – the human factor – something that technology can't easily overcome. This course is aimed at helping individuals who work with private information understand the ways that this information can be disclosed inadvertently, with an aim to ensure that private information doesn't fall into the wrong hands. SkillSoft's Legal Compliance courses are developed and maintained with subject matter support provided by the Labor, Employment, and Employee Benefits Law Group of the law firm of Baker Donelson.

Target Audience
All employees, especially those who have access to private information

Expected Duration (hours)
1.0

Lesson Objectives

Privacy and Information Security

  • match laws that govern the protection of specific types of information for individuals with the types of information they regulate and the industries/sectors most affected
  • recognize examples of personal information that might be considered private
  • identify the potential avenues of exposure businesses must overcome in order to protect private individual information from being disclosed
  • identify the characteristics/tendencies social engineers capitalize on to get the information they want
  • recognize examples of social engineering
  • identify guidelines for ensuring that private information is protected
  • Course Number:
    lchr_01_a10_lc_enus