+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Suggestions for individuals to check and safeguard confidential data

  • Training

  • 60 Minutes
  • Compliance Online
  • ID: 5975609
This webinar focuses on the regulatory requirements surrounding this issue, steps that a company can take to mitigate the risk of loss or exposure, and ways that consumers can participate in the protection of their own information. This webinar will provide valuable assistance to all regulated companies that need to safeguard confidential customer data.

The safeguarding of customer data is one of the most important issues that companies face today. We’ve all seen and heard of recent events where confidential customer data has been lost, stolen, misplaced, deleted, or provided to an unauthorized third party. Preventing unauthorized disclosure or use of this data takes the efforts of both the company and the individual. This webinar focuses on the regulatory requirements surrounding this issue, steps that a company can take to mitigate the risk of loss or exposure, and ways that consumers can participate in the protection of their own information.

Areas Covered in the seminar:

  • Background and overview of the topic and discussion of recent events
  • Brief overview and discussion about relevant legislation, such as the Gramm-Leach-Bliley Act
  • Discussion on various methods that companies can use to protect confidential data
  • Discussion of various ways confidential data can be obtained from businesses by unauthorized people
  • Internet scams that include a resemblance to business and banking communications and websites
  • Suggestions for individuals to check and safeguard confidential data

Who Will Benefit:

This webinar will provide valuable assistance to all regulated companies that need to safeguard confidential customer data. Those that will most directly benefit will be internal auditors responsible for the function, external auditors that co-source the audit function, audit managers, audit committee members, board of director’s members, and anyone who is accountable or responsible for this function.
  • End-users responsible for applications that need to be secured
  • QA managers and personnel
  • Information Technology managers and personnel
  • Validation specialists
  • Consultants
  • Quality system auditors

Course Provider

  • Deborah Donaldson
  • Deborah Donaldson,