0% found this document useful (0 votes)
26 views2 pages

01 (C - Lesson Notes Introduction

This e-learning module on Data Protection and Information Security, created by The Open University's Data Protection and Information Security teams, aims to educate participants on managing data securely and responding to breaches. Upon completion, learners will understand personal data types, data subject rights, and various security policies, as well as how to handle incidents. The course is designed to be accessible and typically takes 45 minutes to complete, with alternative content available for those using assistive technology.

Uploaded by

nagacharo392
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views2 pages

01 (C - Lesson Notes Introduction

This e-learning module on Data Protection and Information Security, created by The Open University's Data Protection and Information Security teams, aims to educate participants on managing data securely and responding to breaches. Upon completion, learners will understand personal data types, data subject rights, and various security policies, as well as how to handle incidents. The course is designed to be accessible and typically takes 45 minutes to complete, with alternative content available for those using assistive technology.

Uploaded by

nagacharo392
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Data Protection and Information Security

Compliance Training.
Introduction
Welcome to this bespoke e-learning module, which has been designed by
The Open University's Data Protection team and Information Security
team.

Working with various classifications of data requires each of us to comply


with various legal obligations to ensure that this data is managed
correctly, securely, and with care.

It is therefore important for you to be aware of how to securely manage


data, and what to do in the case of a personal data breach or an
information security incident.

More information on this course can be found in the headings below.

Learning outcomes
On completing this training, you will be able to:

 Recognise the various types of personal data covered by data


protection legislation at the OU.
 Identify the rights of the data subject under the UKGDPR.
 Recognise how data protection by design and default is applied at
the OU.
 Understand what data protection means at the OU and how to
respond to various requests.
 Apply the correct procedures if protecting personal data goes
wrong.
 Apply a range of information security policies as required in each
policy.
 Apply measures to secure your personal and OU device.
 Recognise several types of phishing attacks and how to report them.
 Apply information security policies when working remotely.
 Apply the concept of the clear desk principles relating to physical
security.
 Recognise when access controls and permissions are required and
how to find advice on applying them.
 Identify a personal data breach and information security incident,
and how to respond to them both in and out of work hours.

Accessibility
This course has been designed to be accessible and inclusive by default.

Some interactive content may not be accessible to learners using assistive


technology, such as a screen reader.

In these instances, an alternative version of the content has been included


in the downloadable text only version of the lesson content.

There is no requirement to download the lesson notes to complete a


lesson.

Course duration
This module has been designed to be completed by the majority of people
in 45 minutes.

Everyone learns differently and as such some learners will need more
time, and others will need less.

You might also like