GDPR and Cyber Security Content Workflow
Courses
Gain unlimited, unrestricted access to Content Workflows with either our Tempus Safety Management or Tempus Safety Management Plus membership plans. Our courses can be consumed by your users as often as you see fit with all activity, results, refreshers and certificates instantly reportable. All our courses are updated and maintained by us, meaning you are always up to date with legislation and regulation! If this wasn’t enough, we are continually adding content to each workflow.
Essentials of GDPR

Overview
The General Data Protection Regulation (GDPR) is a law for the protection of personal data. This essential regulation impacts every business, regardless of size. This course introduces the learner to the new General Data Protection Regulation (GDPR) and how it is different from the Data Protection Act.
What's covered?
The General Data Protection Regulation
The transition to GDPR
Potential penalties
Definition of personal data
Founding principles of GDPR
GDPR Regulations
Essentials of Data Protection

Overview
This course should be completed by all employees who deal with data in some form, such as accessing and amending client or supplier accounts or working with personal and financial data. It is essential to protect both Commercial and Personnel Data.
What's covered?
What is Information, data and data security
International standards that apply
Data protection law
Eight principles of Data Protection
Marketing
Roles and responsibilities
Consequences of non-compliace
Essentials of Information Security

Overview
Information comes in many forms and different formats with differing degrees of classification; it is the lifeblood of every business and as such, should be valued and protected. Information Security is the practice of defending information from unauthorised access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. Regardless of the nature of the data stored or conveyed, there is a legal and moral duty to be aware of its sensitivity and follow the correct procedures.
What's covered?
Why information is important
How information security is implemented
The relationship between data and privacy
The rules on the disclosure of information
Communication
The eight principles
Essentials of Information Security Measures

Overview
At the heart of Information Security is the need to establish robust control measures that prevent security breaches. A regular risk assessment will lead to the continued improvement of information security controls and procedures. However, it is the responsibility of everyone to be aware of the vulnerability of the information they handle, the nature of potential threats and the steps to protect both data and systems.
What's covered?
The classification of data
Computer related security issues
Operating a back-up procedure
Managing mobile devices
Responsibilities for information security
Information security risk assessments
Essentials of Protecting Information

Overview
Information is the lifeblood of every business and as such, should be valued and protected. Should information security practices not be understood by employees and relevant procedures followed, then the organisation will be vulnerable to security breaches. Information Security is the practice of defending information from unauthorised access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.
What's covered?
Security procedures
How to manage passwords
Physical security
Protecting confidential waste
The use of mobile storage and external media
Essentials of Cyber Security

Overview
This course provides nominated Fire Marshalls with the knowledge required to carry out their duties and to contribute to the organisation’s prevention of fire measures. In this course, the learner will learn about fire safety and related work practices of a Fire Marshall.
What's covered?
Phishing, Baiting and Social Engineering
The nature of cybersquatting
Forms of malware and the danger they pose
Preventative measures
The need for policy and procedural reviews
The role of a compliance officer
Sources of suspicion
The advantages of a whistle blower policy
Establishing investigation teams
Are you the target?

Overview
Often the simplest way to hack into an organisation is by targeting its employees. Many people are vulnerable because they mistakenly believe they are not a target for a cyber-attack and that their information or computer has no value. Both these assumptions are untrue. In addition to the monetary value of the device itself, a computer can also hold information that hackers can take advantage of to access work-related business systems and the sensitive data stored, for these reasons; you are one of the cyber criminal’s primary targets.
What's covered?
Risks to business systems
Risks when personal computers are hacked
Explains how to create a secure experiance
How to recognise you have been hacked
What to do if you have been hacked
Insider Threat Awareness

Overview
It is a legal requirement to ensure that fire-resisting doors are correctly installed and adequately maintained, so they are fit for purpose. Buildings must have a ‘competent person’ as referenced in the Fire Safety Order to help them comply with fire door regulations. Fire doors should be regularly inspected for damage that may prevent the door from performing in the event of a fire.
What's covered?
The potential repercussion of a data breach
Motives of an inside attacker
Potential business consequence of an attack
Employee responsibilities
Creating an Insider Threat Awareness Programme

Overview
Insiders pose a substantial threat to every organisation because employees and contractors have the knowledge and access to business-critical systems that allow them to bypass security measures through legitimate means. The nature of insider threats is different from other cybersecurity challenges; these threats require a different strategy for preventing breaches. This course provides an insight as to why an Insider Threat Detection Programme is needed and practical guidance for its creation.
What's covered?
Key governance elements of a programme
Targeting communications effectively
Leadership responsibilities
Five steps to establishing a programme
Payment Card Security

Overview
The use of credit and debit cards has become the preferred method of payment for many consumers and suppliers alike. However, there are security implications that you need to be aware of when processing card payments. The course covers essential training about payment cards; why they could be useful for your business and the security measures that will help protect against fraud when transacting payments by card payment.
What's covered?
Types of card related fraud
Security measures when accepting payments
Card not present fraud
Actions if a void or fake card is presented
What to do if you suspect a customer
Payment Card Industry Data Security Standard

Overview
It is a legal requirement to ensure that fire-resisting doors are correctly installed and adequately maintained, so they are fit for purpose. Buildings must have a ‘competent person’ as referenced in the Fire Safety Order to help them comply with fire door regulations. Fire doors should be regularly inspected for damage that may prevent the door from performing in the event of a fire.
What's covered?
Standards of control
Risks PCI DSS seeks to counter
The importance of training and confidentiality
Cyber-attack technology counter measures
Understanding payment environments
How to conduct PCI DSS audits
How to carry out non-hosted PCI DSS audits
Forms
Gain instant access to every form within the workflow. Customise, schedule and complete tasks online, allowing you to track, report and monitor safety standards and be alerted to non-conformities and or potential issues.
ISO 27001 – 4. Assessment – Gap Analysis
ISO 27001 – 5. Leadership and Workforce Participation – Gap Analysis
ISO 27001 – 6. Planning Gap Analysis
ISO 27001 – 7. Support Gap Analysis
ISO 27001 – 8. Operation – Gap Analysis
ISO 27001 – 9. Performance Evaluation – Gap Analysis
ISO 27001 -10. Improvement – Gap Analysis
PCI DSS Gap Analysis – Section One
PCI DSS Audit – Section One
Data Policy Agreement
Note: Workflows and there allocated training content and forms are continually growing. Therefore the items listed may not be an exhaustive list. However, the content listed are correct at the time of publishing and does represent the minimum number of items preloaded.