Written Information Security Plan Training: Wisp For Dsc
Published 10/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.18 GB | Duration: 1h 0m
Published 10/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.18 GB | Duration: 1h 0m
WISP training bundle with downloadable videos for in house required training
What you'll learn
Understand what the Written Information Security Plan is
Understand and discuss Personally Identifiable Information (PII)
Understand standard policies and procedures to comply with the WISP
Identify employees/contractors needing WISP compliance training
Present WISP training to employees and contractors
Requirements
This course requires the ability to view and download content from a website
Works on Linux, Windows, iphone, Android, or Mac
Description
This course serves as a general training for compliance with WISP requirements. Specific procedures for your firm will need to be presented in addition to this training. This can be in the form of handout, presentation or documentation supplied by your company through a variety of delivery channels. Data Security Coordinators are responsible for training employees at the firm/organization yearly. This course provides required training and includes the complete set of training documents. Highlighted areas as to your organization policies are included in templates. For example, your organization may retain records for a period of 3 years while another organization may retain records for 2. These fields specific to your company policies needs to be included.Your training documentation and license to use this within your organization is included at no extra cost. Individual employee training is also available separately through a separate course at per seat cost, if desired. However, the DSC provides organizational specific information to employees in addition to online learning modules. The training includes:Information about WISPIdentified officers in the organization/firm.Policy sections and documents (separate and consolidated)Safety measuresGeneral procedures for print or electronic documentsThe written information security plan is a current requirement for anyone working with personally identifiable information or PII. Annual training is a requirement for employees or contractors working at these companies. The designated security coordinator is responsible for making sure everyone who is required, completes this training annually. Any new procedures will be presented each year. The employee or contractor is presented an acknowledgement letter. The completion of the training presented by the DSC, with any additional policy and procedure information presented by your company to the learner can be presented as annual WISP training. Remember to include "specific" policies and procedures to your employees in addition to this training.This training is a base and more specific information, if applicable, is needed for your learners. Please contact us with any customization requests.
Overview
Section 1: Introduction
Lecture 1 Introduction
Lecture 2 What is WISP?
Lecture 3 Define the WISP objectives, purpose, and scope
Lecture 4 Data Security Coordinator Responsibilities
Section 2: Responsible Individuals
Lecture 5 Data Security Coordinator
Lecture 6 Public Information Officer
Section 3: Risk Mitigation Policies
Lecture 7 PII Collection and Retention Policy
Lecture 8 Personnel Accountability Policy
Lecture 9 PII Disclosure Policy
Lecture 10 Reportable Event Policy
Section 4: External Policies
Lecture 11 Network Protection Policy
Lecture 12 Firm User Access Control Policy
Lecture 13 Electronic Exchange of PII Policy
Lecture 14 Wi-Fi Access Policy
Lecture 15 Remote Access Policy
Lecture 16 Connected Devices Policy
Lecture 17 Information Security Training Policy
Section 5: Additional Resources
Lecture 18 Retention Specific to your organization
Lecture 19 See your company specifics
Lecture 20 Non-Disclosure Sample
Lecture 21 Hardware records template
Lecture 22 Firm Employees Authorized to Access PII
Lecture 23 Conduct Safeguarding and Rules of Behavior
Lecture 24 Security Breach Procedures and Notifications
Section 6: Acknowlegement
Lecture 25 Signing the Acknowledgement
Lecture 26 Record Keeping
For Data Security Coordinators to ensure the responsibility of annual training is complete.,This course secondary audience is employees, new hires, and consultants working with Personally Identifiable Information.