Global Data Privacy (v2.2)

Lauren Childers
Lauren Childers
  • Updated

GDP.png

Content Summary 

If your business tracks any type of personal information through products, services or promotion, global data privacy rules apply. 

This course teaches the concepts around personal information, the overarching privacy principles, global regulations and enterprise obligations and other key concepts.

Note: This course was updated December 2023. For an overview of what's new, click here.

Emtrain Links

📎 Global Data Privacy 2 Course Summary

📎 Website Course Page

📎 Website Resources

Course Version

  • Global Data Privacy (GDP) 35 Minutes

This course does not have a preset time requirement. Read about options for adding a Minimum Time Requirement for your learners.

Legal Requirements

Emtrain helps clients meet training requirements under:

  • California’s Privacy Rights Act (CPRA)
  • California's Consumer Privacy Act (CCPA)
  • European Unioin's General Data Protection Regulation (GDPR)

Languages

The course is available in English and 50+ machine translations.

Required Course Elements

As part of the course, learners will acknowledge receipt of your Data Privacy policy. Read how to manage course policies.

Policy Acknowledgment 

Policy Acknowledgment cards included in this course include:

  • Data Privacy policy

Screen Shot 2024-02-13 at 12.09.33 PM.png  Screen Shot 2024-02-13 at 12.09.58 PM.png

Screen Shot 2024-01-29 at 4.02.50 PM.png

Relevant Course Pairings

Complementary Microlessons

  • Information Security and Human Error
  • Bribery and Expense Reports
  • Antitrust and Colluding with Competitors

FAQs

What happens if we do not have a Data Privacy policy?

It is highly recommended you develop a workplace policy on Data Privacy so that your workplace is appropriately protected.

What topics should the “response procedures to security incident” focus on? How is it different than a data breach?

Security incidents happen when there is only the potential for a security breach. For example, if you were to lose a laptop, that doesn’t necessarily mean the security has been breached. But means it might be. A data breach happens when an unauthorized person is actually looking at the data. Most companies have a process to address both internal and potential security incidents and a process for an actual breach.

Was this article helpful?

0 out of 0 found this helpful

Have more questions? Submit a request