Want to create interactive content? It’s easy in Genially!

Get started free

Data privacy and protection

Jeanne Searfoorce

Created on April 6, 2025

Start designing with a free template

Discover more than 1500 professional designs like these:

Essential Learning Unit

Akihabara Learning Unit

Genial learning unit

History Learning Unit

Primary Unit Plan

Vibrant Learning Unit

Art learning unit

Transcript

Data privacy and protection

Your Role in Safeguarding Sensitive Information

Start

© Jeanne Noe

Course Index

Data and Privacy Protection
The Course Index provides easy access to each section of the course, allowing you to review any particular section at any time or explore the material at your own pace.

Welcome

What is sensitive data?

Emails and Chats

Smart Data Habits

Company Policy

Privacy Laws

What Should You Do?

Real-World Risks

Course Summary

Quiz: True or False?

© Jeanne Noe

welcome

Data and Privacy Protection

Data protection is not only a compliance need in today's interconnected world, but also an essential skill. Through this course, you will learn how to identify risks, protect sensitive data, and make secure decisions in your day-to-day work.

Spot phishing emails and social engineering tactics

Secure your devices and work environment — on-site or remote

Understand what counts as personal, private, or sensitive data

Follow company policies and legal regulations with ease

Respond confidently to data breaches or security incidents

Avoid common mistakes that put data — and your job — at risk

“Cybersecurity is much more than a matter of IT. It’s a matter of responsibility.” — Stephane Nappo, Global Chief Information Security Officer

Data breaches affect actual people, their reputations, and their careers in addition to systems. By taking this course, you’re helping protect sensitive information and build a culture of trust and integrity at work.

© Jeanne Noe

what is sensitive data?

Data and Privacy Protection
Activity instructions
Sensitive data is information that, if lost or made public, could cause harm to an individual or an organization.

Select the plus (+) to explore examples of sensitive data.

Example: A customer’s full name and social security number Why it's sensitive: This information can be used to commit identity theft if it falls into the wrong hands.

Login credentials, financial records, medical records, personal information (including names, addresses, and Social Security numbers), and private company information. Always use caution when handling this information because even minor errors can have significant repercussions.

Personal Identifiable Information (PII)

Example: A client’s bank account number and routing number Why it's sensitive: Unauthorized access to financial data can lead to fraud or monetary loss.

Financial Account Details

© Jeanne Noe

handling data responsibily

Data and Privacy Protection
Responsible data handling involves sharing, storing, and using information in ways that preserve privacy and guard against illegal access.

Think twice before sharing sensitive information, use secure systems, restrict access to only those who need it, and always abide by company policies. Using data responsibly lowers the possibility of expensive errors and increases trust.

Activity instructions

Select the check mark to learn a best practice.

Delete files securely when no longer needed

Access only what you need

Never share without permission

Lock your screen

Use approved systems

© Jeanne Noe

Email & Chats Dos and Don'ts

Data and Privacy Protection

Double-check recipients before sending

Don’t use personal email for company data

Email and messaging tools like Teams or Slack are great for fast communication—but not always secure.

Email mistakes are a common cause of data breaches. Always double-check recipients and use encrypted attachments for sensitive info. Never send passwords, and avoid personal email accounts. Remember—once an email is sent, it can be forwarded to anyone, putting private data at risk.

Avoid sending private data in chat messages

If you’re unsure, ask before sharing

Activity instructions

Select the plus (+) to learn a best practice.

© Jeanne Noe

Know The LAw

Data and Privacy Protection
Different U.S. laws protect different types of data.

Knowing the rules helps you stay compliant—and protect our clients and company. Tip: Always follow the strictest rule that applies.

Activity instructions

Select the plus (+) to explore the major laws.

FERPA Protects student education records

HIPAA Protects health-related information

GLBA Protects financial institution data

© Jeanne Noe

COMPANY POLICY

Data and Privacy Protection
Our internal policy outlines how we handle data at every step.

View the internal policies below.

Access: Only authorized users should access sensitive data

Storage: Use encrypted or approved tools only

Retention: Delete or archive data as required

Reporting: Speak up if something doesn’t seem right

© Jeanne Noe

rEAL wORLD rISKS

Data and Privacy Protection
Even small mistakes can lead to serious consequences when sensitive data isn’t handled properly.

Used personal USB

Laptop Stolen

Sent the Wrong File

Malware infects network
Documents Exposed
Client Data Breach

You are sitting in a coffee shop and get up for a moment to get a few extra napkins, leaving your work laptop on the table. When you return, the laptop is gone. Sensitive internal files are now in the hands of whoever stole the device.

You plug in your personal USB drive to transfer files during a presentation. It seems harmless, but the drive is unknowingly infected with malware. By the time IT detects the breach, the virus has compromised key company systems.

You’re in a rush and accidentally attach the wrong spreadsheet to a client email. Instead of a project summary, you send confidential customer data meant for internal use. The client reports the issue, and the company suffers a data breach and a major loss of trust.

Remember: A moment of carelessness can lead to lasting damage.

© Jeanne Noe

WHAT should YOU DO?

Data and Privacy Protection
Remember: Take action immediately if you feel that data has been compromised.

Used personal USB

Laptop Stolen

Sent the Wrong File

Malware infects network
IDocuments Exposed
Client Data Breach
  • Stop and assess what information was shared.
  • Notify your manager or data privacy officer immediately.
  • Do not try to "cover it up"—timely reporting helps limit damage.
  • Follow an incident response protocol to alert IT/security.
  • Report the theft to your manager and IT security right away.
  • File a police report, including details about the stolen device.
  • Work with IT to remotely wipe or disable access to company systems.
  • Stop and assess what information was shared.
  • Notify your manager or data privacy officer immediately.
  • Do not try to "cover it up"—timely reporting helps limit damage.
  • Follow the incident response protocol to alert IT/security.

💡 Never leave your laptop unattended in a public space. Lock your screen in an office setting.

💡 Always double-check attachments and recipients before hitting “Send.”

💡 Only use company-approved storage devices.

© Jeanne Noe

Data and Privacy Protection

quiz

© Jeanne Noe

QUIZ 1/5

Data and Privacy Protection

© Jeanne Noe

QUIZ 2/5

Data and Privacy Protection

© Jeanne Noe

QUIZ 3/5

Data and Privacy Protection

© Jeanne Noe

QUIZ 4/5

Data and Privacy Protection

© Jeanne Noe

QUIZ 5/5

Data and Privacy Protection

© Jeanne Noe

Course Summary

Data and Privacy Protection

Think Before You Share: Even when sharing private or sensitive information within your company, make sure you are sure of the recipient, the method, and the need for sharing.

Data Privacy and Protection

Protecting sensitive data is not only a best practice but also a duty in today's digital workplace.

Recognize Red Flags: Keep an eye out for odd data requests, dubious links, and phishing attempts. Report it when you are unsure.

Employees who complete this course will have the skills and information necessary to identify, manage, and protect company and personal data in accordance with organizational and legal requirements. Clear guidelines, interactive scenarios, and real-world examples will give learners the confidence they need to protect data privacy at every touchpoint.

Protect Your Devices: When accessing sensitive data, use secure passwords, lock your screen, and avoid using unprotected Wi-Fi.

© Jeanne Noe

Congratulations!

You've completed the course. Well done!

I hope that you've enjoyed your learning experience today.

© Jeanne Noe

Unit 1

Training Module

An awesome title

Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.

An awesome title

Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.

Training Module

Unit 2

Image Compositions
Sections like this help you create order

Unit 2

Training Module

Visual content is a transversal, universal language, like music. We can understand images from millions of years ago, even from other cultures.

Our brain is biologically primed to process visual content. Almost 50% of our brain is involved in the processing of visual stimulus.

Unit 2

Training Module

An awesome title

An awesome title

An awesome title

Contextualize your topic

Contextualize your topic

Contextualize your topic

And use this space to caption it. This is essential for giving your presentation more visual impact.

And use this space to caption it. To insert an image, you can upload it from your computer or use the resources in the Editor.

And use this space to caption it. You can upload an image from your computer or use the resources available in Genially, on the left side of the Editor. Knock their socks off!

Unit 2

Training Module

We generally grasp visual content better. Visual content is associated with cognitive and psychological mechanisms. We receive things through our eyes; the first image is what counts. We associate visual content with emotions.

Unit 2

Training Module

An awesome title

Contextualize your topic

Yep, you read that right. Interactivity and animation can turn even the most boring content into something super fun. In Genially, we use AI (Awesome interactivity) in all our designs so that you can level up with interactivity and turn your content into something that engages and provides value.

Unit 2

Training Module

Insert an awesome video for your presentation.

And use this space to caption it. Multimedia content is essential in a presentation, to really wow your audience. What’s more, this way you can summarize the content and entertain your audience.

Unit 2

Training Module

Insert an awesome video for your presentation.

And use this space to caption it. Multimedia content is essential in a presentation, to really wow your audience. What’s more, this way you can summarize the content and entertain your audience.

Insert an awesome video for your presentation.

And use this space to caption it. Multimedia content is essential in a presentation, to really wow your audience. What’s more, this way you can summarize the content and entertain your audience.

Unit 2

Training Module

Unit 2

Training Module

An awesome title

An awesome title

An awesome title

Disciplines such as Visual Thinking facilitate the taking of visually rich notes through the use of images, graphs, infographics, and simple drawings. Give it a go!

Visual content is a transversal, universal language, like music. We can understand images from millions of years ago, even from other cultures.

Did you know that Genially allows you to share your creation directly, with no need to download? All ready for your audience to view it from any device and share it anywhere.

Training Module

UNIT 3

Timelines y Diagramas
Sections like this help you create order

UNIT 3

Training Module

20XX

20XX

20XX

Contar historias con orden y jerarquía es fundamental.

Telling stories with an order and a hierarchy is fundamental.

And add toppings: interactivity and animation.

Phase 1
Phase 3
Phase 1

20XX

20XX

20XX

Phase 2
Phase 4
Phase 2

Turn numbers into a story with a graph.

Icons are always a good ally.

Icons are always a good ally.

UNIT 3

Training Module

20XX

20XX

20XX

20XX

20XX

UNIT 3

Training Module

Icons are always a good ally.

Phase 1

20XX

Telling stories with an order and a hierarchy is fundamental.

Phase 2

20XX

UNIT 3

Training Module

Icons are always a good ally.

Phase 1

20XX

Telling stories with an order and a hierarchy is fundamental.

Phase 2

20XX

Turn numbers into a story with a graph.

Phase 3

20XX

And add toppings: interactivity and animation.

Phase 4

20XX

Got an idea?

Let the communication flow!

With Genially templates, you can include visual resources to wow your audience. You can also highlight a particular sentence or piece of information so that it sticks in your audience’s minds, or even embed external content to surprise them: Whatever you like! Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.

  • Generate experiences with your content.
  • It’s got the Wow effect. Very Wow.
  • Make sure your audience remembers the message.

Got an idea?

Let the communication flow!

With Genially templates, you can include visual resources to wow your audience. You can also highlight a particular sentence or piece of information so that it sticks in your audience’s minds, or even embed external content to surprise them: Whatever you like! Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.

  • Generate experiences with your content.
  • It’s got the Wow effect. Very Wow.
  • Make sure your audience remembers the message.

Got an idea?

Let the communication flow!

With Genially templates, you can include visual resources to wow your audience. You can also highlight a particular sentence or piece of information so that it sticks in your audience’s minds, or even embed external content to surprise them: Whatever you like! Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.

  • Generate experiences with your content.
  • It’s got the Wow effect. Very Wow.
  • Make sure your audience remembers the message.

Got an idea?

Let the communication flow!

With Genially templates, you can include visual resources to wow your audience. You can also highlight a particular sentence or piece of information so that it sticks in your audience’s minds, or even embed external content to surprise them: Whatever you like! Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.

  • Generate experiences with your content.
  • It’s got the Wow effect. Very Wow.
  • Make sure your audience remembers the message.

Got an idea?

Let the communication flow!

With Genially templates, you can include visual resources to wow your audience. You can also highlight a particular sentence or piece of information so that it sticks in your audience’s minds, or even embed external content to surprise them: Whatever you like! Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.

  • Generate experiences with your content.
  • It’s got the Wow effect. Very Wow.
  • Make sure your audience remembers the message.