Jump to content

Wisp Training


Recommended Posts


170a4c64b339f5899fc5a6744e066d26.jpg
Wisp Training
Published 10/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.07 GB | Duration: 0h 54m


For compliance with WISP

What you'll learn

Understand what the Written Information Security Plan is

Understand and discuss Personally Identifiable Information (PII)

Understand standard policies and procedures to comply with the WISP

Identify employees/contractors needing WISP compliance training

Complete WISP training: employees and contractors

Requirements

This course requires the ability to view and download content from a website

Works on Linux, Windows, iphone, Android, or Mac

Description

This course is directed at anyone interested in complying with WISP training for those who have access to personal identifiable information. This course covers the topics and attestation of signed documents for your organization. The system does not allow upload of documents but does offer attestation the documents are signed.Signed documents must be handled per your company policy for record keeping. See your designated security officer for more information. Certification of completed training on Udemy is provided, but record keeping is done per your organization requirements. This course serves as a general training for compliance with WISP requirements. Specific procedures for your firm will need to be presented in addition to this training. This can be in the form of handout, presentation or documentation supplied by your company through a variety of delivery channels. The training includes:Information about WISPIdentified officers in the organization/firm.Policy sections and documents (separate and consolidated)Safety measuresGeneral procedures for print or electronic documentsThe written information security plan is a current requirement for anyone working with personally identifiable information or PII. Annual training is a requirement for employees or contractors working at these companies. The designated security coordinator is responsible for making sure everyone who is required, completes this training annually. Any new procedures will be presented each year. The employee or contractor is presented an acknowledgement letter. The completion of the training presented by the DSC, with any additional policy and procedure information presented by your company to the learner can be presented as annual WISP training. Remember to include "specific" policies and procedures to your employees in addition to this training.This training is a base and more specific information, if applicable, is needed for your learners. The course was developed by Marcia K Wilbur, privacy advocate. Her experience in privacy includes working with the US Department of Education and the Arizona Department of Education in creating FERPA training to protect student personal identifiable information. In 2019 Marcia spoke at Yale Law school about privacy. Recently, she spoke at HOPE 2024 in New York about privacy policies and maintains dirtyTOS, sharing information about privacy matters.

Overview

Section 1: Introduction

Lecture 1 Introduction

Lecture 2 What is WISP?

Lecture 3 Define the WISP objectives, purpose, and scope

Section 2: Responsible Individuals

Lecture 4 Data Security Coordinator

Lecture 5 Public Information Officer

Section 3: Risk Mitigation Policies

Lecture 6 PII Collection and Retention Policy

Lecture 7 Personnel Accountability Policy

Lecture 8 PII Disclosure Policy

Lecture 9 Reportable Event Policy

Section 4: External Policies

Lecture 10 Network Protection Policy

Lecture 11 Firm User Access Control Policy

Lecture 12 Electronic Exchange of PII Policy

Lecture 13 Wi-Fi Access Policy

Lecture 14 Remote Access Policy

Lecture 15 Connected Devices Policy

Lecture 16 Information Security Training Policy

Section 5: Additional Resources

Lecture 17 Retention Specific to your organization

Lecture 18 See your company specifics

Lecture 19 Hardware records

Lecture 20 Firm Employees Authorized to Access PII

Lecture 21 Conduct Safeguarding and Rules of Behavior

Lecture 22 Security Breach Procedures and Notifications

Lecture 23 Non-Disclosure agreement

Section 6: Acknowlegement

Lecture 24 Signing the Acknowledgement instructions

This course audience is employees, new hires, and consultants working with Personally Identifiable Information.

YUBgZLhQ_o.jpg

Fikper

https://fikper.com/QXbSbRCnO8/WISP.Training.part1.rar.html
https://fikper.com/xtIHUfHtCx/WISP.Training.part2.rar.html

FileAxa

https://fileaxa.com/wlpg8bsuysgb/WISP.Training.part1.rar
https://fileaxa.com/bxsprokqrv2n/WISP.Training.part2.rar

RapidGator

https://rapidgator.net/file/a7c7ca4161c43fd4c43c81bb0a408c87/WISP.Training.part1.rar
https://rapidgator.net/file/d5de2ca2218adba83afc3019f5002b1d/WISP.Training.part2.rar

FileStore

TurboBit

https://turbobit.net/14lu1fpvfafr/WISP.Training.part1.rar.html
https://turbobit.net/656e9q59ucep/WISP.Training.part2.rar.html


Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...