Law, Ethics, and Security Compliance Management
Technology continues to rapidly evolve, expand, and provide organizations unprecedented global reach. Understanding global privacy laws, import/export laws, and how various regulations can affect a business has never been more important.
What you'll learn
Businesses of all sizes can operate on a global scale. Privacy laws and data protection laws continue to evolve and become more restrictive. It's important for leaders to understand the changing landscape and what compliance means for their company. In this course, Law, Ethics, and Security Compliance Management, you will learn the foundations of global privacy law, import/export regulations, and how they can impact your organization. First, you’ll learn about the ever changing global privacy laws such as GDPR and CCPA. Next, you’ll learn about pertinent intellectual property concepts laws, along with key import/export laws. Finally, you’ll learn about the importance of taking an ethical approach to compliance management and how that not only strengthens your company’s security posture, but ensures the best chance for compliance with applicable laws and regulations. When you're finished with this course, you'll understanding global privacy laws, import/export laws, and how various regulations can affect a business.
Table of contents
- Introduction 1m
- Who Should Watch This Course? 3m
- Doing Business in a Global Economy and Privacy Compliance Challenges 5m
- Regulatory Examples 1m
- Gramm-Leach-Bliley Act (GLBA) 1m
- Health Insurance Portability and Accountability Act (HIPAA) 1m
- HITECH Act 2m
- Sarbanes-Oxley Act (SOX) 3m
- SOX - Important Sections 2m
- Events That Led to SOX 2m
- GDPR and Types of Data Covered 2m
- GDPR Key Terminology and 6 Data Processing Principles 2m
- 6 Legal Grounds for Processing Personal Data (GDPR) 1m
- GDPR Compliance and Penalties 1m
- Example Compliance Scenario 2m
- Brazilian Version of GDPR 1m
- California Consumer Privacy Act (CCPA) 3m
- Licensing and EULA 1m
- Equipment-specific and Site Licenses 2m
- Open Source and GNU General Public Licenses (GPL) 2m
- Introduction 1m
- Intellectual Property 1m
- Types of Intellectual Property Protection 1m
- Copyright 1m
- Implementing Copyright Policy 3m
- Fair Use Doctrine 3m
- Trademark and Trademark Infringement 1m
- Patent and Types of Patents 2m
- Document Management and Retention 3m
- Import/export Laws 1m
- Export Control Tiers and Tier Restrictions 3m
- Wassenaar Arragement 3m
- Liability 3m
- Contributory Negligence 1m
- Example Liability Scenario 2m
- Introduction 1m
- Privacy 1m
- U.S. Privacy Laws 2m
- U.K. Privacy Laws 2m
- Company Obligations to Protect Security 2m
- Potential Damages from Mishandled Data 1m
- Transborder Data Flow 2m
- Monitoring Employees 1m
- Use Cases for Monitoring 3m
- Things Typically Monitored 3m
- New Tools Constantly Being Developed 2m
- Monitoring Social Media 1m
- Employee Protections 1m
- Court Orders and Subpoenas 1m
- Attacker Tools 1m
- Additional Monitoring Use Cases 2m
- Intrusion Detection/prevention Systems 1m
- Evidence Considerations 2m
- Module Review 1m
- Introduction 1m
- Compliance Goal and Terminology 1m
- Compliance Management 1m
- Security from the Business' Perspective 3m
- The Security Cycle 1m
- Multiple Ways of Managing Risk 1m
- Managing Risk: Definition 1m
- Risk Transference, Acceptance, Mitigation, and Avoidance 3m
- Strategic Options 2m
- Example Compliance Frameworks and Drivers 3m
- Compliance Accountability 2m
- Creating the Culture of Compliance 1m
- Enterprise Security Framework 1m
- NIST SP 800-53 2m
- ISO 27001 Example 2m
- Compliance Scenario Example 5m