Empower your workforce through a personalized training curriculum that provides essential knowledge to protect sensitive corporate information, nurture a security-oriented organizational culture, and ensure adherence to the China Personal Information Protection Law.
Audience: All/ End-Users, Learning time: 35-40 minutes
Customize this course
Discover the wide range of customization options available for this course, allowing you to tailor the training to your specific needs and preferences.
Feature your logo
Add information classification
Add incident reporting information
Translate the course (optional)
The Information Security and China Data Protection course is designed to establish the organization’s primary defence against cyber threats by offering comprehensive training in Information Security. The training helps employees learn the key principles and best practices for safeguarding personal data. Furthermore, the course covers guidelines for the collection and processing personal data within China, ensuring compliance with the PIPL regulations and preservation of personal data privacy.
The course includes an assessment at the end.
Section 1: Cyber Threat Landscape
This course section adopts a practical approach by delving into real-life cyber security incidents rather than focusing solely on theoretical concepts. Employees can then apply this knowledge to their work, implementing proactive measures to prevent similar incidents from occurring. Furthermore, they explore incidents that have affected employees, customers, suppliers and third-parties, thereby expanding their comprehension of information security threats.
Section 2: Essential Elements of Information Security and Data Privacy
This section covers the key pillars of information security and the value of information.
- CIA Triad
- Data Classification
- Types of Personal Information
Section 3: Common Cyberattacks and Prevention
This section covers the most common cyberattacks and best practices to prevent them.
- Phishing and its variants
Section 4: Practicing Information Security at Work
This section covers nine challenges based on real-life scenarios and preventive measures that employees can apply to their work.
- Secure Access to Facilities
- Safe Remote Working
- Securing Access Credentials
- Safe Internet Browsing
- Safe Usage of Email and Collaboration Platforms
- Safe Social Media Usage
- Safe Usage of AI Apps
- Safe Usage of Information Storage and Transfer
Section 5: Understanding China Personal Information Privacy Law (PIPL)
This section focuses on key concepts and principles of China PIPL that are essential for understanding and ensuring data protection and privacy.
- What is the China Personal Information Protection Law (PIPL)?
- Why is PIPL important?
- Who does PIPL apply to?
- Definitions under PIPL
- Rights of a Data Subject
- Consequences of Non-Compliance with the PIPL
Section 6: Reporting Privacy Breaches and Security Incidents
This section highlights examples of privacy breaches and security incidents and provides guidance on reporting procedures.
- What is a privacy breach?
- Examples of privacy breaches
- Overview of Information Security Incidents
- Examples of Information Security Incidents
- Reporting Privacy Breaches and Security Incidents
Section 7: Summary and Assessment
This section summarizes the key takeaways from this course. Also, an assessment towards the end to test the knowledge level and understanding.