Information Security Awareness

  • 4 topics | 18m
  • Up to 30 languages
  • Transcripts
Federal employees must be aware of the potential threats to the information systems they use in their daily work. To do so, federal employees must understand how to adequately protect data that is collected, processed, and used by the agency, including personally identifiable information (PII). In this course, you'll learn about the threats to information systems and the responsibility of federal employees to protect information and ensure the secure operation of federal information systems. This course was developed with subject matter support provided by the Labor, Employment, and Employee Benefits Law Group of the law firm of Sheehan Phinney Bass & Green PA. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with any federal, state, or local laws. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking professional counsel. The information contained herein is provided only as general information that may or may not reflect the most current legal developments. This information is not provided in the course of an attorney-client relationship and is not intended to constitute legal advice or to substitute for obtaining legal advice from an attorney licensed in your state.

WHAT YOU WILL LEARN

  • identify examples of the types of incidents that can compromise information security
  • recognize examples of information security threats
  • identify security measures and best practices federal employees should use in their everyday work
  • recognize how to protect information systems

IN THIS COURSE

  • Information Security Incidents
    4m
  • Threats to Information System Security
    3m
  • Information Security Best Practices
    5m
  • Information Security Awareness
    3m

YOU MIGHT ALSO LIKE

COMPLIANCE-COURSE Hatch Act Overview
COMPLIANCE-COURSE Insider Threat Awareness