Data privacy and protection
Your Role in Safeguarding Sensitive Information
Start
© Jeanne Noe
Course Index
Data and Privacy Protection
The Course Index provides easy access to each section of the course, allowing you to review any particular section at any time or explore the material at your own pace.
Welcome
What is sensitive data?
Emails and Chats
Smart Data Habits
Company Policy
Privacy Laws
What Should You Do?
Real-World Risks
Course Summary
Quiz: True or False?
© Jeanne Noe
welcome
Data and Privacy Protection
Data protection is not only a compliance need in today's interconnected world, but also an essential skill. Through this course, you will learn how to identify risks, protect sensitive data, and make secure decisions in your day-to-day work.
Spot phishing emails and social engineering tactics
Secure your devices and work environment — on-site or remote
Understand what counts as personal, private, or sensitive data
Follow company policies and legal regulations with ease
Respond confidently to data breaches or security incidents
Avoid common mistakes that put data — and your job — at risk
“Cybersecurity is much more than a matter of IT. It’s a matter of responsibility.”
— Stephane Nappo, Global Chief Information Security Officer
Data breaches affect actual people, their reputations, and their careers in addition to systems. By taking this course, you’re helping protect sensitive information and build a culture of trust and integrity at work.
© Jeanne Noe
what is sensitive data?
Data and Privacy Protection
Activity instructions
Sensitive data is information that, if lost or made public, could cause harm to an individual or an organization.
Select the plus (+) to explore examples of sensitive data.
Example: A customer’s full name and social security number Why it's sensitive: This information can be used to commit identity theft if it falls into the wrong hands.
Login credentials, financial records, medical records, personal information (including names, addresses, and Social Security numbers), and private company information. Always use caution when handling this information because even minor errors can have significant repercussions.
Personal Identifiable Information (PII)
Example: A client’s bank account number and routing number Why it's sensitive: Unauthorized access to financial data can lead to fraud or monetary loss.
Financial Account Details
© Jeanne Noe
handling data responsibily
Data and Privacy Protection
Responsible data handling involves sharing, storing, and using information in ways that preserve privacy and guard against illegal access.
Think twice before sharing sensitive information, use secure systems, restrict access to only those who need it, and always abide by company policies. Using data responsibly lowers the possibility of expensive errors and increases trust.
Activity instructions
Select the check mark to learn a best practice.
Delete files securely when no longer needed
Access only what you need
Never share without permission
Lock your screen
Use approved systems
© Jeanne Noe
Email & Chats Dos and Don'ts
Data and Privacy Protection
Double-check recipients before sending
Don’t use personal email for company data
Email and messaging tools like Teams or Slack are great for fast communication—but not always secure.
Email mistakes are a common cause of data breaches. Always double-check recipients and use encrypted attachments for sensitive info. Never send passwords, and avoid personal email accounts. Remember—once an email is sent, it can be forwarded to anyone, putting private data at risk.
Avoid sending private data in chat messages
If you’re unsure, ask before sharing
Activity instructions
Select the plus (+) to learn a best practice.
© Jeanne Noe
Know The LAw
Data and Privacy Protection
Different U.S. laws protect different types of data.
Knowing the rules helps you stay compliant—and protect our clients and company. Tip: Always follow the strictest rule that applies.
Activity instructions
Select the plus (+) to explore the major laws.
FERPA Protects student education records
HIPAA Protects health-related information
GLBA Protects financial institution data
© Jeanne Noe
COMPANY POLICY
Data and Privacy Protection
Our internal policy outlines how we handle data at every step.
View the internal policies below.
Access: Only authorized users should access sensitive data
Storage: Use encrypted or approved tools only
Retention: Delete or archive data as required
Reporting: Speak up if something doesn’t seem right
© Jeanne Noe
rEAL wORLD rISKS
Data and Privacy Protection
Even small mistakes can lead to serious consequences when sensitive data isn’t handled properly.
Used personal USB
Laptop Stolen
Sent the Wrong File
Malware infects network
Documents Exposed
Client Data Breach
You are sitting in a coffee shop and get up for a moment to get a few extra napkins, leaving your work laptop on the table. When you return, the laptop is gone. Sensitive internal files are now in the hands of whoever stole the device.
You plug in your personal USB drive to transfer files during a presentation.
It seems harmless, but the drive is unknowingly infected with malware.
By the time IT detects the breach, the virus has compromised key company systems.
You’re in a rush and accidentally attach the wrong spreadsheet to a client email. Instead of a project summary, you send confidential customer data meant for internal use. The client reports the issue, and the company suffers a data breach and a major loss of trust.
Remember: A moment of carelessness can lead to lasting damage.
© Jeanne Noe
WHAT should YOU DO?
Data and Privacy Protection
Remember: Take action immediately if you feel that data has been compromised.
Used personal USB
Laptop Stolen
Sent the Wrong File
Malware infects network
IDocuments Exposed
Client Data Breach
- Stop and assess what information was shared.
- Notify your manager or data privacy officer immediately.
- Do not try to "cover it up"—timely reporting helps limit damage.
- Follow an incident response protocol to alert IT/security.
- Report the theft to your manager and IT security right away.
- File a police report, including details about the stolen device.
- Work with IT to remotely wipe or disable access to company systems.
- Stop and assess what information was shared.
- Notify your manager or data privacy officer immediately.
- Do not try to "cover it up"—timely reporting helps limit damage.
- Follow the incident response protocol to alert IT/security.
💡 Never leave your laptop unattended in a public space. Lock your screen in an office setting.
💡 Always double-check attachments and recipients before hitting “Send.”
💡 Only use company-approved storage devices.
© Jeanne Noe
Data and Privacy Protection
quiz
© Jeanne Noe
QUIZ 1/5
Data and Privacy Protection
© Jeanne Noe
QUIZ 2/5
Data and Privacy Protection
© Jeanne Noe
QUIZ 3/5
Data and Privacy Protection
© Jeanne Noe
QUIZ 4/5
Data and Privacy Protection
© Jeanne Noe
QUIZ 5/5
Data and Privacy Protection
© Jeanne Noe
Course Summary
Data and Privacy Protection
Think Before You Share: Even when sharing private or sensitive information within your company, make sure you are sure of the recipient, the method, and the need for sharing.
Data Privacy and Protection
Protecting sensitive data is not only a best practice but also a duty in today's digital workplace.
Recognize Red Flags: Keep an eye out for odd data requests, dubious links, and phishing attempts. Report it when you are unsure.
Employees who complete this course will have the skills and information necessary to identify, manage, and protect company and personal data in accordance with organizational and legal requirements. Clear guidelines, interactive scenarios, and real-world examples will give learners the confidence they need to protect data privacy at every touchpoint.
Protect Your Devices: When accessing sensitive data, use secure passwords, lock your screen, and avoid using unprotected Wi-Fi.
© Jeanne Noe
Congratulations!
You've completed the course. Well done!
I hope that you've enjoyed your learning experience today.
© Jeanne Noe
Unit 1
Training Module
An awesome title
Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.
An awesome title
Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.
Training Module
Unit 2
Image Compositions
Sections like this help you create order
Unit 2
Training Module
Visual content is a transversal, universal language, like music. We can understand images from millions of years ago, even from other cultures.
Our brain is biologically primed to process visual content. Almost 50% of our brain is involved in the processing of visual stimulus.
Unit 2
Training Module
An awesome title
An awesome title
An awesome title
Contextualize your topic
Contextualize your topic
Contextualize your topic
And use this space to caption it. This is essential for giving your presentation more visual impact.
And use this space to caption it. To insert an image, you can upload it from your computer or use the resources in the Editor.
And use this space to caption it. You can upload an image from your computer or use the resources available in Genially, on the left side of the Editor. Knock their socks off!
Unit 2
Training Module
We generally grasp visual content better. Visual content is associated with cognitive and psychological mechanisms. We receive things through our eyes; the first image is what counts. We associate visual content with emotions.
Unit 2
Training Module
An awesome title
Contextualize your topic
Yep, you read that right. Interactivity and animation can turn even the most boring content into something super fun. In Genially, we use AI (Awesome interactivity) in all our designs so that you can level up with interactivity and turn your content into something that engages and provides value.
Unit 2
Training Module
Insert an awesome video for your presentation.
And use this space to caption it. Multimedia content is essential in a presentation, to really wow your audience. What’s more, this way you can summarize the content and entertain your audience.
Unit 2
Training Module
Insert an awesome video for your presentation.
And use this space to caption it. Multimedia content is essential in a presentation, to really wow your audience. What’s more, this way you can summarize the content and entertain your audience.
Insert an awesome video for your presentation.
And use this space to caption it. Multimedia content is essential in a presentation, to really wow your audience. What’s more, this way you can summarize the content and entertain your audience.
Unit 2
Training Module
Unit 2
Training Module
An awesome title
An awesome title
An awesome title
Disciplines such as Visual Thinking facilitate the taking of visually rich notes through the use of images, graphs, infographics, and simple drawings. Give it a go!
Visual content is a transversal, universal language, like music. We can understand images from millions of years ago, even from other cultures.
Did you know that Genially allows you to share your creation directly, with no need to download? All ready for your audience to view it from any device and share it anywhere.
Training Module
UNIT 3
Timelines y Diagramas
Sections like this help you create order
UNIT 3
Training Module
20XX
20XX
20XX
Contar historias con orden y jerarquía es fundamental.
Telling stories with an order and a hierarchy is fundamental.
And add toppings: interactivity and animation.
Phase 1
Phase 3
Phase 1
20XX
20XX
20XX
Phase 2
Phase 4
Phase 2
Turn numbers into a story with a graph.
Icons are always a good ally.
Icons are always a good ally.
UNIT 3
Training Module
20XX
20XX
20XX
20XX
20XX
UNIT 3
Training Module
Icons are always a good ally.
Phase 1
20XX
Telling stories with an order and a hierarchy is fundamental.
Phase 2
20XX
UNIT 3
Training Module
Icons are always a good ally.
Phase 1
20XX
Telling stories with an order and a hierarchy is fundamental.
Phase 2
20XX
Turn numbers into a story with a graph.
Phase 3
20XX
And add toppings: interactivity and animation.
Phase 4
20XX
Got an idea?
Let the communication flow!
With Genially templates, you can include visual resources to wow your audience. You can also highlight a particular sentence or piece of information so that it sticks in your audience’s minds, or even embed external content to surprise them: Whatever you like! Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.
- Generate experiences with your content.
- It’s got the Wow effect. Very Wow.
- Make sure your audience remembers the message.
Got an idea?
Let the communication flow!
With Genially templates, you can include visual resources to wow your audience. You can also highlight a particular sentence or piece of information so that it sticks in your audience’s minds, or even embed external content to surprise them: Whatever you like! Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.
- Generate experiences with your content.
- It’s got the Wow effect. Very Wow.
- Make sure your audience remembers the message.
Got an idea?
Let the communication flow!
With Genially templates, you can include visual resources to wow your audience. You can also highlight a particular sentence or piece of information so that it sticks in your audience’s minds, or even embed external content to surprise them: Whatever you like! Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.
- Generate experiences with your content.
- It’s got the Wow effect. Very Wow.
- Make sure your audience remembers the message.
Got an idea?
Let the communication flow!
With Genially templates, you can include visual resources to wow your audience. You can also highlight a particular sentence or piece of information so that it sticks in your audience’s minds, or even embed external content to surprise them: Whatever you like! Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.
- Generate experiences with your content.
- It’s got the Wow effect. Very Wow.
- Make sure your audience remembers the message.
Got an idea?
Let the communication flow!
With Genially templates, you can include visual resources to wow your audience. You can also highlight a particular sentence or piece of information so that it sticks in your audience’s minds, or even embed external content to surprise them: Whatever you like! Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.
- Generate experiences with your content.
- It’s got the Wow effect. Very Wow.
- Make sure your audience remembers the message.
Data privacy and protection
Jeanne Searfoorce
Created on April 6, 2025
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Essential Learning Unit
View
Akihabara Learning Unit
View
Genial learning unit
View
History Learning Unit
View
Primary Unit Plan
View
Vibrant Learning Unit
View
Art learning unit
Explore all templates
Transcript
Data privacy and protection
Your Role in Safeguarding Sensitive Information
Start
© Jeanne Noe
Course Index
Data and Privacy Protection
The Course Index provides easy access to each section of the course, allowing you to review any particular section at any time or explore the material at your own pace.
Welcome
What is sensitive data?
Emails and Chats
Smart Data Habits
Company Policy
Privacy Laws
What Should You Do?
Real-World Risks
Course Summary
Quiz: True or False?
© Jeanne Noe
welcome
Data and Privacy Protection
Data protection is not only a compliance need in today's interconnected world, but also an essential skill. Through this course, you will learn how to identify risks, protect sensitive data, and make secure decisions in your day-to-day work.
Spot phishing emails and social engineering tactics
Secure your devices and work environment — on-site or remote
Understand what counts as personal, private, or sensitive data
Follow company policies and legal regulations with ease
Respond confidently to data breaches or security incidents
Avoid common mistakes that put data — and your job — at risk
“Cybersecurity is much more than a matter of IT. It’s a matter of responsibility.” — Stephane Nappo, Global Chief Information Security Officer
Data breaches affect actual people, their reputations, and their careers in addition to systems. By taking this course, you’re helping protect sensitive information and build a culture of trust and integrity at work.
© Jeanne Noe
what is sensitive data?
Data and Privacy Protection
Activity instructions
Sensitive data is information that, if lost or made public, could cause harm to an individual or an organization.
Select the plus (+) to explore examples of sensitive data.
Example: A customer’s full name and social security number Why it's sensitive: This information can be used to commit identity theft if it falls into the wrong hands.
Login credentials, financial records, medical records, personal information (including names, addresses, and Social Security numbers), and private company information. Always use caution when handling this information because even minor errors can have significant repercussions.
Personal Identifiable Information (PII)
Example: A client’s bank account number and routing number Why it's sensitive: Unauthorized access to financial data can lead to fraud or monetary loss.
Financial Account Details
© Jeanne Noe
handling data responsibily
Data and Privacy Protection
Responsible data handling involves sharing, storing, and using information in ways that preserve privacy and guard against illegal access.
Think twice before sharing sensitive information, use secure systems, restrict access to only those who need it, and always abide by company policies. Using data responsibly lowers the possibility of expensive errors and increases trust.
Activity instructions
Select the check mark to learn a best practice.
Delete files securely when no longer needed
Access only what you need
Never share without permission
Lock your screen
Use approved systems
© Jeanne Noe
Email & Chats Dos and Don'ts
Data and Privacy Protection
Double-check recipients before sending
Don’t use personal email for company data
Email and messaging tools like Teams or Slack are great for fast communication—but not always secure.
Email mistakes are a common cause of data breaches. Always double-check recipients and use encrypted attachments for sensitive info. Never send passwords, and avoid personal email accounts. Remember—once an email is sent, it can be forwarded to anyone, putting private data at risk.
Avoid sending private data in chat messages
If you’re unsure, ask before sharing
Activity instructions
Select the plus (+) to learn a best practice.
© Jeanne Noe
Know The LAw
Data and Privacy Protection
Different U.S. laws protect different types of data.
Knowing the rules helps you stay compliant—and protect our clients and company. Tip: Always follow the strictest rule that applies.
Activity instructions
Select the plus (+) to explore the major laws.
FERPA Protects student education records
HIPAA Protects health-related information
GLBA Protects financial institution data
© Jeanne Noe
COMPANY POLICY
Data and Privacy Protection
Our internal policy outlines how we handle data at every step.
View the internal policies below.
Access: Only authorized users should access sensitive data
Storage: Use encrypted or approved tools only
Retention: Delete or archive data as required
Reporting: Speak up if something doesn’t seem right
© Jeanne Noe
rEAL wORLD rISKS
Data and Privacy Protection
Even small mistakes can lead to serious consequences when sensitive data isn’t handled properly.
Used personal USB
Laptop Stolen
Sent the Wrong File
Malware infects network
Documents Exposed
Client Data Breach
You are sitting in a coffee shop and get up for a moment to get a few extra napkins, leaving your work laptop on the table. When you return, the laptop is gone. Sensitive internal files are now in the hands of whoever stole the device.
You plug in your personal USB drive to transfer files during a presentation. It seems harmless, but the drive is unknowingly infected with malware. By the time IT detects the breach, the virus has compromised key company systems.
You’re in a rush and accidentally attach the wrong spreadsheet to a client email. Instead of a project summary, you send confidential customer data meant for internal use. The client reports the issue, and the company suffers a data breach and a major loss of trust.
Remember: A moment of carelessness can lead to lasting damage.
© Jeanne Noe
WHAT should YOU DO?
Data and Privacy Protection
Remember: Take action immediately if you feel that data has been compromised.
Used personal USB
Laptop Stolen
Sent the Wrong File
Malware infects network
IDocuments Exposed
Client Data Breach
💡 Never leave your laptop unattended in a public space. Lock your screen in an office setting.
💡 Always double-check attachments and recipients before hitting “Send.”
💡 Only use company-approved storage devices.
© Jeanne Noe
Data and Privacy Protection
quiz
© Jeanne Noe
QUIZ 1/5
Data and Privacy Protection
© Jeanne Noe
QUIZ 2/5
Data and Privacy Protection
© Jeanne Noe
QUIZ 3/5
Data and Privacy Protection
© Jeanne Noe
QUIZ 4/5
Data and Privacy Protection
© Jeanne Noe
QUIZ 5/5
Data and Privacy Protection
© Jeanne Noe
Course Summary
Data and Privacy Protection
Think Before You Share: Even when sharing private or sensitive information within your company, make sure you are sure of the recipient, the method, and the need for sharing.
Data Privacy and Protection
Protecting sensitive data is not only a best practice but also a duty in today's digital workplace.
Recognize Red Flags: Keep an eye out for odd data requests, dubious links, and phishing attempts. Report it when you are unsure.
Employees who complete this course will have the skills and information necessary to identify, manage, and protect company and personal data in accordance with organizational and legal requirements. Clear guidelines, interactive scenarios, and real-world examples will give learners the confidence they need to protect data privacy at every touchpoint.
Protect Your Devices: When accessing sensitive data, use secure passwords, lock your screen, and avoid using unprotected Wi-Fi.
© Jeanne Noe
Congratulations!
You've completed the course. Well done!
I hope that you've enjoyed your learning experience today.
© Jeanne Noe
Unit 1
Training Module
An awesome title
Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.
An awesome title
Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.
Training Module
Unit 2
Image Compositions
Sections like this help you create order
Unit 2
Training Module
Visual content is a transversal, universal language, like music. We can understand images from millions of years ago, even from other cultures.
Our brain is biologically primed to process visual content. Almost 50% of our brain is involved in the processing of visual stimulus.
Unit 2
Training Module
An awesome title
An awesome title
An awesome title
Contextualize your topic
Contextualize your topic
Contextualize your topic
And use this space to caption it. This is essential for giving your presentation more visual impact.
And use this space to caption it. To insert an image, you can upload it from your computer or use the resources in the Editor.
And use this space to caption it. You can upload an image from your computer or use the resources available in Genially, on the left side of the Editor. Knock their socks off!
Unit 2
Training Module
We generally grasp visual content better. Visual content is associated with cognitive and psychological mechanisms. We receive things through our eyes; the first image is what counts. We associate visual content with emotions.
Unit 2
Training Module
An awesome title
Contextualize your topic
Yep, you read that right. Interactivity and animation can turn even the most boring content into something super fun. In Genially, we use AI (Awesome interactivity) in all our designs so that you can level up with interactivity and turn your content into something that engages and provides value.
Unit 2
Training Module
Insert an awesome video for your presentation.
And use this space to caption it. Multimedia content is essential in a presentation, to really wow your audience. What’s more, this way you can summarize the content and entertain your audience.
Unit 2
Training Module
Insert an awesome video for your presentation.
And use this space to caption it. Multimedia content is essential in a presentation, to really wow your audience. What’s more, this way you can summarize the content and entertain your audience.
Insert an awesome video for your presentation.
And use this space to caption it. Multimedia content is essential in a presentation, to really wow your audience. What’s more, this way you can summarize the content and entertain your audience.
Unit 2
Training Module
Unit 2
Training Module
An awesome title
An awesome title
An awesome title
Disciplines such as Visual Thinking facilitate the taking of visually rich notes through the use of images, graphs, infographics, and simple drawings. Give it a go!
Visual content is a transversal, universal language, like music. We can understand images from millions of years ago, even from other cultures.
Did you know that Genially allows you to share your creation directly, with no need to download? All ready for your audience to view it from any device and share it anywhere.
Training Module
UNIT 3
Timelines y Diagramas
Sections like this help you create order
UNIT 3
Training Module
20XX
20XX
20XX
Contar historias con orden y jerarquía es fundamental.
Telling stories with an order and a hierarchy is fundamental.
And add toppings: interactivity and animation.
Phase 1
Phase 3
Phase 1
20XX
20XX
20XX
Phase 2
Phase 4
Phase 2
Turn numbers into a story with a graph.
Icons are always a good ally.
Icons are always a good ally.
UNIT 3
Training Module
20XX
20XX
20XX
20XX
20XX
UNIT 3
Training Module
Icons are always a good ally.
Phase 1
20XX
Telling stories with an order and a hierarchy is fundamental.
Phase 2
20XX
UNIT 3
Training Module
Icons are always a good ally.
Phase 1
20XX
Telling stories with an order and a hierarchy is fundamental.
Phase 2
20XX
Turn numbers into a story with a graph.
Phase 3
20XX
And add toppings: interactivity and animation.
Phase 4
20XX
Got an idea?
Let the communication flow!
With Genially templates, you can include visual resources to wow your audience. You can also highlight a particular sentence or piece of information so that it sticks in your audience’s minds, or even embed external content to surprise them: Whatever you like! Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.
Got an idea?
Let the communication flow!
With Genially templates, you can include visual resources to wow your audience. You can also highlight a particular sentence or piece of information so that it sticks in your audience’s minds, or even embed external content to surprise them: Whatever you like! Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.
Got an idea?
Let the communication flow!
With Genially templates, you can include visual resources to wow your audience. You can also highlight a particular sentence or piece of information so that it sticks in your audience’s minds, or even embed external content to surprise them: Whatever you like! Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.
Got an idea?
Let the communication flow!
With Genially templates, you can include visual resources to wow your audience. You can also highlight a particular sentence or piece of information so that it sticks in your audience’s minds, or even embed external content to surprise them: Whatever you like! Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.
Got an idea?
Let the communication flow!
With Genially templates, you can include visual resources to wow your audience. You can also highlight a particular sentence or piece of information so that it sticks in your audience’s minds, or even embed external content to surprise them: Whatever you like! Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.