Virtual Learning - Security and Data Protection
Anti-Bribery Essentials
Duration: 45 minutes
The Bribery Act 2010 is among the strictest legislation internationally on bribery. It is now possible to charge organisations if it is found they failed to prevent bribery, and to charge individuals who are found guilty of bribing or being bribed. Knowing exactly what is and isn’t accepted under the Act enables employees to act within the confines of the law.
This course explains the Bribery Act, including the four offences covered by it, and uses case studies to give learners more insight. This course can form an integral part of an organisation’s defence against the crime of failing to prevent bribery.
This course helps you understand the Bribery Act and shows you how the provisions of this UK legislation function.
When you finish the course, you will be asked to demonstrate your understanding of some of the key points by completing a short assessment.
Courses have been certified by the CPD Certification Service and count towards your annual CPD requirement.
Objectives
By the end of the course, you should be able to:
Define bribery and corruption
Understand the Bribery Act 2010 and the penalties for breaking the law
Recognise what constitutes a crime under the Bribery Act
Know the six principles organisations should follow when designing their bribery policies and procedures
Know what actions to take should you suspect bribery
Topics
Jurisdiction of the Bribery Act
Six principles for organisations
Penalties under the Bribery Act
4 Bribery Act offences
Spotting and suspecting a bribe
Preventing bribery
Anti-Money Laundering Essentials
Duration: 50 minutes
Every year, billions of pounds are illegally laundered through the UK. Any one of us could be handling laundered money without even realising it!
This course aims to increase awareness of money laundering and includes a range of learning activities to help you develop your understanding of money laundering and how to prevent it.
When you finish the course, you’ll be asked to demonstrate your understanding by completing a short assessment.
Courses have been certified by the CPD Certification Service and count towards your annual CPD requirement.
Objectives
After completing this course, learners will be able to:
Describe what money laundering is and how it is done
Understand UK legislation and regulations regarding money laundering and what they cover
Explain how to prevent money laundering
Recognise the consequences of non-compliance with anti-money laundering legislation
Topics
Money laundering and terrorist financing
Government anti money laundering legislation
Preventing money laundering
Consequences of non-compliance
Counter Fraud
Duration: 45 minutes
This Counter Fraud online course examines the different types of fraud active today as well as the role and responsibilities of the individual when suspecting fraud. It looks at the threat and impact upon organisations and what the employees response should be when fraudulent activity is uncovered.
Objectives
After completing this course learners will be able to:
Understand the Fraud Act 2006
Explain the fraud triangle
Identify the different types of emerging risks
Recall and employ their responsibilities
Describe the importance of countering fraud
Recognise the different types of fraud and ‘red flags’
Understand the dangers of money laundering
Topics
Fraud Act 2006
The Importance of counter fraud
Different types of fraud
The fraud triangle
Being wrong
Red Flags
Money laundering
Reporting
Organisational policies
Emerging risks
The Importance of training
Responsibilities
Counter Fraud (Healthcare)
Duration: 45 minutes
This Counter Fraud (Healthcare) online course examines the different types of fraud active today, as well as the responsibilities of the individual when suspecting fraud. It looks at the role of NHS Protect in countering fraud in the healthcare sector and explores how organisations can safeguard themselves from the financially and psychologically damaging impact of fraudulent behaviour.
Objectives
After completing this course learners will be able to:
Apply the healthcare fraud reporting process
Be aware of NHS Protect
Explain the fraud triangle
Identify the different types of emerging risks
Understand and employ your responsibilities
Understand the importance of countering fraud
Recognise the different types of fraud and ‘red flags’
Understand the dangers of money laundering
Topics
Fraud Act 2006
The importance of counter fraud
Different types of fraud
NHS Protect
The fraud triangle
Being wrong
Red flags
Money laundering
Reporting
Organisational policies
Emerging risks
The Importance of training
Responsibilities
Cyber User Awareness Training (Basic)
Duration: 45 minutes
This Cyber User Awareness Training (Basic) course has been designed to give us a better insight into the day-to-day cyber challenges we face. It is critical for businesses and organisations to understand that hard-earned trust, reputation and commercial viability are significantly compromised during a single cyber incident. This course provides practical advice on how to better safeguard your company and personal information at work and at home, and offers techniques for identifying different types of potential or actual cyber attacks.
Objectives
After completing the course, learners will be able to:
Understand that ‘cyber’ is more than just IT
Understand the concept of the Internet of Things
Have a better understanding of how Data Protection laws are changing
Explain the key differences between the outside and inside cyber threat and what constitutes these types of threats
Understand the importance of passwords and their security in defending your information against a cyber threat
Understand what makes up your digital footprint, and how it can be used as a means of attack
Remember ways to control and manage your digital footprint
Identify ways to stay cyber safe while at work, at home and working on the move
Know what to do if any of your personal accounts are compromised or hacked
Topics
What is cyber?
The cyber threat
Information security threats
The outsider threat
Hackers & hacktivists
Nation state
Industrial competitors
Organised crime
The insider threat
Password management
Digital footprints
Staying safe at work and at home
Tips and techniques on safeguarding information
Data Protection Essentials
Duration: 45 minutes
As a company employee, the responsibility falls on you to keep individuals’ data safe, secure and processed appropriately. As such, you need to know about, and comply with, current data protection regulations – the General Data Protection Regulation (GDPR) and the Data Protection Act 2018 – to avoid serious legal consequences for you and your employer. This course will help you understand the aims and provisions of the UK’s data protection legislation and offers essential, practical advice on how to make yourself compliant.
This elearning module includes a range of learning activities to help you develop your understanding of data protection.
When you finish the course, you will be asked to demonstrate your understanding by completing an assessment.
Objectives
By the end of the course you should be able to:
Recognise why fair and effective data management is important to individuals and to society as a whole
Understand relevant data protection legislation and regulations, along with the penalties for breaching these
Work with information in a way that doesn’t breach the data protection principles and individuals’ rights
Respond to requests for information from individuals in a way that is legal and effective
Topics
Understanding the need for data protection laws
EU and UK data control
Explaining The UK General Data Protection Regulation (GDPR) and Data Protection Act 2018
Defining personal data
Individuals’ rights
Data protection principles
Working with data
Documentation in Healthcare
Duration: 30 minutes
Top notch documentation or ‘record keeping’ is crucial to the provision of safe and effective healthcare – it is not an optional extra. This course on Documentation in Healthcare addresses the legislation and guidelines underpinning documentation. It takes the learner through the importance of accurate documentation and explores the consequences of poor quality record keeping.
Objectives
After completing the course, learners will be able to:
Understand best practice and legal requirements for record keeping and documentation
Recognise the importance of documentation
Understand what information needs to be documented and the guidelines for documentation
Be aware of the ‘do’s and don’ts’ of documentation
Topics
Legislation
Data Protection Act 1998
Accountability and responsibility
Principles of good record keeping
Types of documentation
Subjective or objective terminology
Confidentiality
NHS Code of Practice 2003
Documentation do’s and don’ts
Inappropriate documentation
FOI requests
Freedom of Information Essentials
Duration: 35 minutes
This course outlines the parameters of the FOI Act and explores how requests under the Act should be made and dealt with.
This elearning module gives you a greater understanding of the Freedom of Information Act 2000 and explains how this legislation functions.
When you finish the course, you’ll be asked to demonstrate your understanding by completing a short assessment.
Courses have been certified by the CPD Certification Service and count towards your annual CPD requirement.
Objectives
After completing this course, learners will be able to:
Recognise when and where the main provisions of the Freedom of Information Act apply
Understand the types of information that will be shared in an organisation’s publication scheme
Make or handle requests for information in an appropriate way
Understand the rights of individuals under the Act and the consequences of not complying with the legislation
Topics
Main provisions for the Freedom of Information Act
Types of information covered under the Act
Public authority duties
Publishing information
Dealing with requests for information
Providing information and refusing a request
General Data Protection Regulation for Managers
Duration: 45 minutes
This course includes a range of learning activities to help you reinforce your understanding of the General Data Protection Regulation (GDPR). The GDPR heralds the biggest shake up to data protection laws for over 20 years. The GDPR will ensure that data protection laws across Europe favour the customer and see greater fines for those who do not comply.
This General Data Protection Regulation for Managers course has been developed by cyber security specialists, and will present you with material aimed to assist you in your day-to-day role as a manager, which in parts will be quite detailed, but will help both yourself and your employees to understand how the regulation applies and should be followed. This course is an excellent way for you, as a manager, to demonstrate that your organisation is putting in place organisational controls.
Objectives
After completing the course, learners will be able to:
Fully understand why the GDPR has been introduced
Understand the differences between ‘personal data’, ‘special personal data’ and ‘children’s data’
Understand that different stakeholders will have specific roles and responsibilities under the GDPR
Explain the rights of your Data Subjects and how you need to recognise them
Understand how your organisation should work with personal data to meet the requirements of the GDPR. This includes responding to data requests and assisting in any data breach investigations
Topics
The General Data Protection Regulation
Understanding personal data
Roles and responsibilities
Working with personal data
Responding to requests and reporting incidents
General Data Protection Regulation for Employees
Duration: 45 minutes
The General Data Protection Regulation (GDPR) heralds the biggest shake up to data protection laws for over 20 years. The GDPR will ensure that data protection laws across Europe favour the customer and see greater fines for those who do not comply.
As a company employee, it is your responsibility to ensure you store and process customer data lawfully. To do this, you will need to understand why we need the GDPR and what are the provisions of the GDPR, understand your responsibilities as an employee and be aware of what the GDPR means to you and your organisation.
This General Data Protection Regulation for Employees course has been developed by cyber security specialists and will help you to fully understand the responsibilities you have as an employee when processing and storing customer data. This course is an excellent way for organisations to demonstrate they are putting in place organisational controls.
Objectives
After completing the course, learners will be able to:
Understand why we need the General Data Protection Regulation (GDPR)
Understand the provisions of the GDPR
Explain what the GDPR means to you and your organisation
Topics
Explaining the GDPR
Personal data
Roles and responsibilities
Data subject rights
Working with data
Information Governance
Duration: 30 minutes
Information Governance refers to the way the NHS or social care organisations deal with patient and employee data and how the sharing of this information between care provision services is regulated. This course examines information governance legislation, Caldicott protocols, the role of the Caldicott Guardian and staff responsibilities with a focus on issues that are relevant to healthcare professionals.
Objectives
After completing the course, learners will be able to:
Understand what information governance is
Refer to legislation underpinning information governance including the Freedom of Information Act 2000
Be knowledgeable about the Caldicott principles and the role of Caldicott Guardian
Follow the principles of information governance and their responsibility in relation to safeguarding patient and organisational information
Benefit from an introduction to the information governance toolkit
Topics
Defining information governance
Legislation
Freedom of Information Act
Confidential information
Caldicott principles
Information sharing
Information governance toolkit
Responsibilities
Information Security Awareness
Duration: 45 minutes
This highly interactive course helps your employees become more aware of their role in information security. It prepares them to do their part and leaves them with best practice tips to ensure your and their information is kept secure!
This elearning course includes a range of learning activities to help you develop your understanding of information security.
When you finish the course, you’ll be asked to demonstrate your understanding by completing a short assessment.
Courses have been certified by the CPD Certification Service and count towards your annual CPD requirement.
Objectives
By the end of the course you should be able to:
Recognise why information security is essential to organisations
Identify secure working practices to safeguard company data
Protect information when working remotely and on mobile devices
Improve your awareness of online risks and how to stay safe on the internet
Respond to and report information security issues
Topics
Working with information
Information security requirements
Keeping information secure in and out of the office
Staying safe online: passwords, links, email threats, malware, phishing, social engineering, and scams
Phishing
Duration: 30 minutes
This courseis de signed to enhance the learner’s knowledge of one of the fastest growing cyber attack methods: phishing. The course is useful for anyone who works with digital devices, and provides learners with details of information security threats, attack methods, and tips and techniques on safeguarding.
Objectives
After completing the course, learners will be able to:
Understand the definition and different types of phishing
Explain why phishing attacks are used and how your digital footprint can be exploited for these attacks and for social engineering purposes
Examine the rise of cyber crime and why phishing continues to be a key tool and technique for attacks
Understand the different types of phishing attacks and how the complexity of each one can be completely different
Know the best way to respond to phishing attacks when at work and at home
Topics
Introduction to phishing
History of phishing
Why phishing is used
Type of attacks
Staying safe