Handling Data Securely and Responsibly
Learning Outcomes
Get More Info
data, Tech & ai skills in






What’s Included
Introduction to Security Protocols
Introduction to Security Protocols
Information security is important to any company that deals with sensitive, personal, or confidential information. This lesson explains the importance of this topic, and outlines some of the laws and standards in the field.
Protecting Personal Data
Protecting Personal Data
Personal data needs to be processed in a sensitive way that respects the privacy rights of the individual. This lesson and the following lesson outline 7 principles that can be followed to process people's information in a responsible manner.
Further Data Protection Principles
Further Data Protection Principles
This lesson outlines the remaining principles that should be followed when processing people's data, so that you act in a responsible manner.
Taking Responsibility for Data Security
Taking Responsibility for Data Security
In order for data security to be prioritized in your company, it's important to know who's in charge of it. This lesson teaches you who should be responsible for data protection, and what they should do.
Protecting Data Subjects
Protecting Data Subjects
When collecting data from individuals, it's important to know what rights they have. This lesson teaches you how to respect the rights of individuals whose data you collect.
Collecting Data from External Parties
Collecting Data from External Parties
Companies often collect data from external parties, such as customers or suppliers. This lesson explains the best practices to follow when collecting this data.
Collecting and Sharing Data With Employees
Collecting and Sharing Data With Employees
Companies can often collect sensitive and personal information about their employees. This lesson explains how to collect this information responsibly and securely.
Managing Information Assets
Managing Information Assets
Information assets can include physical assets such as computers or non-physical assets such as intellectual property. This lesson teaches you how to keep these assets safe from security threats.
Keeping Communications Secure
Keeping Communications Secure
Communication and information transfer presents an opportunity for sensitive information to be lost. This lesson explains how to avoid incidents occurring when transferring information.
Ensuring Workplace Security
Ensuring Workplace Security
Keeping information secure requires you to keep the workplace where the information is accessed secure. This lesson teaches you how you can do this.
Implementing Remote Working Policies
Implementing Remote Working Policies
Remote working can present dangers when important information leaves the workplace and its controlled environment. This lesson teaches you how to maintain data security when employees work remotely.
Documenting Data Handling Policies
Documenting Data Handling Policies
There are several documents that can be used to explain your company's data handling policies. This lesson outlines some of the most common examples.
