We use cookies to make this site as useful as possible. Read our cookie policy or allow cookies.

CPD: 6 hours 30 mins

About

Any mishandling of information can come with severe penalties. This online training package contains a variety of courses that highlight the key areas of concern and their potential consequences if you get it wrong. They will also take you through the best practices and processes that you should be putting in place to avoid such risks.

The Information Security online training package consists of eight individual courses:

  • Overview of Information Security
  • Information Barriers
  • Electronics Communications
  • Responsible Use of Social Media
  • Managing Data Protection
  • Confidentiality
  • Privacy
  • Records Management


Package contains

Overview of Information Security

  • Why is information security important?
  • Information classification
  • Protecting your company’s data
  • Data encryption
  • Confidentiality contracts
  • Using communication channels
  • Internet access and your company
  • Internet fraud
  • Using company email
  • Portable devices
  • Portable media
  • Software security
  • Network access
  • Creating passwords
  • Access control

Information Barriers

  • Information flow
  • Information barriers
  • How are information barriers structured?
  • Other information barriers
  • Control room
  • Defining inside information
  • Inside information violations
  • Inside information can affect anyone
  • Perceived abuse of inside information
  • Your responsibilities
  • Case study: Careless sharing
  • Wall crossings

Electronic Communications

  • Examples of damaging messages
  • Content and tone considerations
  • Professionalism
  • Think before you “Send”
  • Email is business correspondence
  • Retention and monitoring
  • Internal-use-only documents
  • Using approved third-party systems
  • Public forums
  • Information security considerations
  • Keep your user ID, passwords and PINs confidential
  • Need-to-know
  • Observing professional conduct

Responsible use of Social Media

  • Should you use social media?
  • Getting started
  • Your profile
  • What’s appropriate?
  • Joining discussions
  • Real world case: John Sawers
  • Exposing personal information?
  • Social Engineering
  • Protecting your information

Managing Data Protection

  • The UK law on data protection
  • Data protection vs. information security
  • The FCA and Information Security
  • Information security policy, tools & techniques
  • Response plans and processes
  • International information security standards and initiatives – the OECD recommendations

Confidentiality

  • What is confidential information?
  • Client information
  • Information about a potential client
  • Proprietary information
  • Inside information
  • What is inside information?
  • Case study: Research report
  • “Need to know” principle
  • Chinese Walls
  • Wall crossings
  • Social slips
  • Safeguarding projects and documents
  • Consequences of breaching confidentiality

Privacy

  • Terrible Tuesday
  • Privacy policy
  • An increasing problem
  • A risky email
  • Examples of non-public personal information
  • A careless phone call
  • Consequences for clients
  • A problematic desktop
  • Remote-systems access
  • Additional risks
  • Principles for protecting information
  • Privacy-breach response plan

Records Management

  • Definition of a record
  • Key questions
  • Classifications of business records
  • Types of business records
  • Classification and categorisation
  • Email as a business record
  • The records management cycle
  • Inventory
  • Onsite records
  • Record storage
  • Local retention schedules
  • Record disposal
  • Disposal holds



Course price

£100 + VAT (non-members)
£90 + VAT (ICSA members)
£60 + VAT (ICSA students)

Course date

Buy now Book now

Course price

£100 + VAT (non-members)
£90 + VAT (ICSA members)
£60 + VAT (ICSA students)

Buy now