What HR Must Know About Protecting Confidential information
Empower Your HR: Safeguarding Confidentiality Starts Here!
Instructor :
Don Phin
Webinar ID:
15439
Date: DEC 04, 2024 (WED)
Start Time: 10 am PT
Duration: 1 Hr.
What you will learn
- Just What is Confidential Information?
- Stay Ahead of the Data Breach Epidemic
- Protecting Customers, Clients, and Employees.
- Protecting Management Information.
- Pros and cons of Nondisclosure Agreements.
- Non-competition Agreements.
- Just What is Confidential Information?
- Stay Ahead of the Data Breach Epidemic
- Protecting Customers, Clients, and Employees.
- Protecting Management Information.
- Pros and cons of Nondisclosure Agreements.
- Non-competition Agreements.
- Laws Surrounding the Drafting and Enforcement of Social Media Policies.
- Maintaining Cybersecurity Around Confidential Information and much more…
Course Description
Did you know that 70% of companies have suffered data breaches due to mishandling of confidential information? – For a company, such breaches can cause significant financial loss, averaging $3.86 million per incident, not to mention severe reputation damage!
When you consider that 34% of data breaches involve internal actors (Verizon, 2020), it brings a stark reality into focus: Your own employees could inadvertently be your biggest cybersecurity threat.
There is no doubt that people on the outside…and inside… of your company are looking to access critical confidential information.
HR professionals and other managers are privy to salaries, financial information, health insurance information, social security numbers, and other sensitive employee and customer data.
It’s time for us to reflect on our practices and ensure we have the knowledge and strategies to protect our confidential information effectively.
In this course, veteran attorney Don Phin helps you
- Gain an understanding of confidentiality by laying out the main areas to consider.
- He shares best practices that can help both managers and employees behave within legal and ethical parameters.
- Learn about non-disclosure and non-competition agreements, social media policies, cybersecurity, and more.
By the end of the training, you will have a robust understanding of
- How to protect confidential information
- Reduce the risk of data breaches
- Ensure compliance with data protection laws.
- The tools and knowledge to protect your organization from costly and reputation-damaging data breaches.
Join Now!
Did you know that 70% of companies have suffered data breaches due to mishandling of confidential information? – For a company, such breaches can cause significant financial loss, averaging $3.86 million per incident, not to mention severe reputation damage!
When you consider that 34% of data breaches involve internal actors (Verizon, 2020), it brings a stark reality into focus: Your own employees could inadvertently be your biggest cybersecurity threat.
There is no doubt that people on the outside…and inside… of your company are looking to access critical confidential information.
HR professionals and other managers are privy to salaries, financial information, health insurance information, social security numbers, and other sensitive employee and customer data.
It’s time for us to reflect on our practices and ensure we have the knowledge and strategies to protect our confidential information effectively.
In this course, veteran attorney Don Phin helps you
- Gain an understanding of confidentiality by laying out the main areas to consider.
- He shares best practices that can help both managers and employees behave within legal and ethical parameters.
- Learn about non-disclosure and non-competition agreements, social media policies, cybersecurity, and more.
By the end of the training, you will have a robust understanding of
- How to protect confidential information
- Reduce the risk of data breaches
- Ensure compliance with data protection laws.
- The tools and knowledge to protect your organization from costly and reputation-damaging data breaches.
Join Now!
Why you should attend
“Nobody Fully Appreciates A Risk, Until They Suffer It!”
If you constantly worry about:
- Potential data breaches and cyber threats that could compromise confidential employee information.
- Striking the right balance between making confidential information accessible to relevant parties for HR purposes and ensuring robust security measures.
- Ensuring that all employees are well-informed about data protection policies and protocols.
- The potential risks posed by employees who may accidentally or intentionally mishandle confidential data, leading to insider threats.
- With more employees working remotely, the protection of confidential information is becoming even more complex.
- Staying compliant with ever-changing data protection laws and regulations.
In that case, this webinar is for you!
Don Phin explores the tactics of some of today’s best-known firms to help both managers and employees behave within legal and ethical parameters.
Discover practical techniques to identify and address internal &external risks, and foster a culture of security and confidentiality within your organization.
Enroll Now!
“Nobody Fully Appreciates A Risk, Until They Suffer It!”
If you constantly worry about:
- Potential data breaches and cyber threats that could compromise confidential employee information.
- Striking the right balance between making confidential information accessible to relevant parties for HR purposes and ensuring robust security measures.
- Ensuring that all employees are well-informed about data protection policies and protocols.
- The potential risks posed by employees who may accidentally or intentionally mishandle confidential data, leading to insider threats.
- With more employees working remotely, the protection of confidential information is becoming even more complex.
- Staying compliant with ever-changing data protection laws and regulations.
In that case, this webinar is for you!
Don Phin explores the tactics of some of today’s best-known firms to help both managers and employees behave within legal and ethical parameters.
Discover practical techniques to identify and address internal &external risks, and foster a culture of security and confidentiality within your organization.
Enroll Now!
Course Agenda
- Just What is Confidential Information?
- Stay Ahead of the Data Breach Epidemic
- Protecting Customers, Clients, and Employees.
- Protecting Management Information.
- Pros and cons of Nondisclosure Agreements.
- Non-competition Agreements.
- Laws Surrounding the Drafting and Enforcement of Social Media Policies.
- Maintaining Cybersecurity Around Confidential Information.
- And much more…
BONUS:
- PDF copy of the presentation handout for your future reference.
- Protecting Confidential Information Checklist (UPDATED)
- Soft copy of the certificate of completion on request.
- Q&A Session with the Presenter: Get your pressing questions answered verbally, via chat or email.
- Just What is Confidential Information?
- Stay Ahead of the Data Breach Epidemic
- Protecting Customers, Clients, and Employees.
- Protecting Management Information.
- Pros and cons of Nondisclosure Agreements.
- Non-competition Agreements.
- Laws Surrounding the Drafting and Enforcement of Social Media Policies.
- Maintaining Cybersecurity Around Confidential Information.
- And much more…
BONUS:
- PDF copy of the presentation handout for your future reference.
- Protecting Confidential Information Checklist (UPDATED)
- Soft copy of the certificate of completion on request.
- Q&A Session with the Presenter: Get your pressing questions answered verbally, via chat or email.
Who is this course for
Experience the benefits of this training individually and maximize them in a group setting!
- Human Resources Directors/Managers
- Chief Human Resources Officers (CHRO)
- Data Protection Officers (DPO)
- Chief Information Security Officers (CISO)
- General Counsel/In-house Legal Departments
- Compliance Officers
- IT Managers/Information Security Managers
- Risk Managers
- Privacy Officers
- Training and Development Managers
Experience the benefits of this training individually and maximize them in a group setting!
- Human Resources Directors/Managers
- Chief Human Resources Officers (CHRO)
- Data Protection Officers (DPO)
- Chief Information Security Officers (CISO)
- General Counsel/In-house Legal Departments
- Compliance Officers
- IT Managers/Information Security Managers
- Risk Managers
- Privacy Officers
- Training and Development Managers
Instructor Profile
Don Phin is a 35 yr. California employment law attorney…and in the process has learned what doesn’t work in employee relations. After leaving his litigation practice, Don built HRThatWorks, used by 3,500 companies, and acquired by ThinkHR. He coaches HR executives and has presented over 600 times to CEOs, HR, and other executives on what works in employee relations. Don recently released The 40| |40 Solution: Mastering the Emotional Energy of Leadership and Sales.