Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Written Information Security Plan Training: Wisp For Dsc

    Posted By: ELK1nG
    Written Information Security Plan Training: Wisp For Dsc

    Written Information Security Plan Training: Wisp For Dsc
    Published 10/2024
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 2.18 GB | Duration: 1h 0m

    WISP training bundle with downloadable videos for in house required training

    What you'll learn

    Understand what the Written Information Security Plan is

    Understand and discuss Personally Identifiable Information (PII)

    Understand standard policies and procedures to comply with the WISP

    Identify employees/contractors needing WISP compliance training

    Present WISP training to employees and contractors

    Requirements

    This course requires the ability to view and download content from a website

    Works on Linux, Windows, iphone, Android, or Mac

    Description

    This course serves as a general training for compliance with WISP requirements. Specific procedures for your firm will need to be presented in addition to this training. This can be in the form of handout, presentation or documentation supplied by your company through a variety of delivery channels.  Data Security Coordinators are responsible for training employees at the firm/organization yearly. This course provides required training and includes the complete set of training documents. Highlighted areas as to your organization policies are included in templates. For example, your organization may retain records for a period of 3 years while another organization may retain records for 2. These fields specific to your company policies needs to be included.Your training documentation and license to use this within your organization is included at no extra cost. Individual employee training is also available separately through a separate course at per seat cost, if desired. However, the DSC provides organizational specific information to employees in addition to online learning modules.  The training includes:Information about WISPIdentified officers in the organization/firm.Policy sections and documents (separate and consolidated)Safety measuresGeneral procedures for print or electronic documentsThe written information security plan is a current requirement for anyone working with personally identifiable information or PII. Annual training is a requirement for employees or contractors working at these companies. The designated security coordinator is responsible for making sure everyone who is required, completes this training annually. Any new procedures will be presented each year. The employee or contractor is presented an acknowledgement letter. The completion of the training presented by the DSC, with any additional policy and procedure information presented by your company to the learner can be presented as annual WISP training. Remember to include "specific" policies and procedures to your employees in addition to this training.This training is a base and more specific information, if applicable, is needed for your learners. Please contact us with any customization requests.

    Overview

    Section 1: Introduction

    Lecture 1 Introduction

    Lecture 2 What is WISP?

    Lecture 3 Define the WISP objectives, purpose, and scope

    Lecture 4 Data Security Coordinator Responsibilities

    Section 2: Responsible Individuals

    Lecture 5 Data Security Coordinator

    Lecture 6 Public Information Officer

    Section 3: Risk Mitigation Policies

    Lecture 7 PII Collection and Retention Policy

    Lecture 8 Personnel Accountability Policy

    Lecture 9 PII Disclosure Policy

    Lecture 10 Reportable Event Policy

    Section 4: External Policies

    Lecture 11 Network Protection Policy

    Lecture 12 Firm User Access Control Policy

    Lecture 13 Electronic Exchange of PII Policy

    Lecture 14 Wi-Fi Access Policy

    Lecture 15 Remote Access Policy

    Lecture 16 Connected Devices Policy

    Lecture 17 Information Security Training Policy

    Section 5: Additional Resources

    Lecture 18 Retention Specific to your organization

    Lecture 19 See your company specifics

    Lecture 20 Non-Disclosure Sample

    Lecture 21 Hardware records template

    Lecture 22 Firm Employees Authorized to Access PII

    Lecture 23 Conduct Safeguarding and Rules of Behavior

    Lecture 24 Security Breach Procedures and Notifications

    Section 6: Acknowlegement

    Lecture 25 Signing the Acknowledgement

    Lecture 26 Record Keeping

    For Data Security Coordinators to ensure the responsibility of annual training is complete.,This course secondary audience is employees, new hires, and consultants working with Personally Identifiable Information.