Print Page | Contact Us | Sign In | Register
ARMA Online Store: Learning
Main Storefront
        

Privacy and Security in RIM

Item Options
Sign in for your pricing!
Price: $246.00
Quantity: *
 
Description

Now viewable on mobile devices!

Information privacy is no longer simply a matter of mitigating risk through firewalls to prevent data breaches. Regulators and customers are demanding protection of personal information collected for business.  Canada, the European Union, Congress, and other entities are creating regulations for the use, transfer, and protection of personal identifiable information (PII).

Information protection and privacy are integral parts of your organization’s risk management strategy, yet how prepared are you to prevent leakage and breaches or, worse yet, to deal with the consequences?

 

This comprehensive online course provides records management professionals with the foundation of knowledge concerning privacy and the protection of PII. It addresses the basic principles and concepts of privacy, the legal and regulatory landscape within the United States, and the legal and regulatory implications from a global perspective. This course sheds light on the top privacy issues in today’s business climate, including social networking, privacy and marketing, and global information privacy threats. Learn about the threats to personal data with regard to medical records, how to mitigate the risks of data breaches, and the dangers of mingling personal and corporate data. Determine if your corporate privacy policies and safeguards and technological measures are sufficient or are they leaving your company vulnerable to breaches and possible litigation?

 

Each section of this online course contains learning objectives and audio, and there are several review questions that will help prepare you for the final exam. Also, you can download the course contents for easy offline reading and review.

 

You have 12 months from the date of registration to complete the course. Here's HOW TO ACCESS YOUR EDUCATION. 

Estimated time of completion:  2.5 hours
 
ICRM Maintenance Credits:  2.5
IGP Recertification Credits:  2.5 General
 
 
Domain:  Risk Management      Level: 2
 
Learning Objectives 
Upon completion of this course, you will be able to:
  1. Describe the most pressing threats to the security of personal data
  2. Identify the principles, regulations, best practices, and guidance that affect an organization’s privacy practices
  3. Explain pressing privacy and information security issues
  4. List ways for organizations to protect private records from data breaches
  5. Explain how RIM can lessen the threats to privacy
  6. Explain how RIM can ensure there is a comprehensive privacy program that lessens threats to privacy, complies with external requirements, and satisfies internal business needs
Section 1: Information Privacy
Upon completion of this section, participants will be able to:
  1. Compare the definitions of privacy
  2. Define personally identifiable information and describe its significance
  3. Explain the concept of how the United States takes a “piecemeal approach” to dealing with issues of privacy
  4. Describe the conflict between marketers and privacy advocates
  5. Define “opt in” and “opt out”
Section 2: Relevant Laws and Standards
Upon completion of this section, participants will be able to:
  1. Define the FCRA, FACTA, GLBA, HIPAA, and the FOIA
  2. Summarize the EU Directive, the Canadian Privacy Act, and PIPEDA
  3. Describe the Safe Harbor Act and list its seven principles
  4. Summarize the privacy frameworks established by the OECD and APEC
Section 3: Threats to Privacy
Upon completion of this section, participants will be able to:
  1. Summarize the effects of technology on privacy 
  2. Explain how the blurring of work data and personal data affects privacy issues
  3. Define a data breach and describe the processes for identifying and responding to one
Section 4: Information Security
Upon completion of this section, participants will be able to:
  1. Summarize the most prominent standards that concern the security of records
  2. List the technological measures your organization can take to secure records 
  3. Outline protective measures for physical and electronic records
Section 5: Privacy, Security and RIM
Upon completion of this section, participants will be able to:
  1. Explain RIM’s role in safeguarding confidential records 
  2. Summarize the role and value of a chief privacy officer
  3. List and describe the five common security classifications 
This website uses cookies to store information on your computer. Some of these cookies are used for visitor analysis, others are essential to making our site function properly and improve the user experience. By using this site, you consent to the placement of these cookies. Click Accept to consent and dismiss this message or Deny to leave this website. Read our Privacy Statement for more.