Compliance

View all 71 of our Compliance content pieces available in SecurityIQ.

Infosec Named a Leader in 2019 Gartner Magic Quadrant

Recognized for ability to execute and completeness of vision in Security Awareness Computer-Based Training, learn the latest market trends and what we believe sets Infosec apart.

COPPA

COPPA

This module covers the provisions of the Children's Online Privacy Protection Act (COPPA). It outlines when an organization is subject to COPPA requirements, and how to ensure compliance with COPPA provisions.

View More
Dissemination and Destruction Assessment

Dissemination and Destruction Assessment

View More
Sarbanes-Oxley Act Assessment

Sarbanes-Oxley Act Assessment

View More
FCPA Assessment

FCPA Assessment

View More
Physical Security and PHI

Physical Security and PHI

HIPAA includes specific requirements for physical safeguards that every organization should have in place to secure protected health information (PHI).

View More
Introduction to DFARS

Introduction to DFARS

This security and awareness training is an introduction to DFARS, or the Defense Federal Acquisition Regulation Supplement.

View More
Red Flags Rule Assessment

Red Flags Rule Assessment

View More
The Sarbanes-Oxley Act (SOX)

The Sarbanes-Oxley Act (SOX)

This module covers The Sarbanes-Oxley Act of 2002 (SOX), a law enacted to combat major, large-scale corporate and accounting fraud. In this module, we’ll review SOX mandates to enhance corporate responsibility, improve financial disclosures and combat corporate and accounting fraud.

View More
Consequences of PHI Release Assessment

Consequences of PHI Release Assessment

View More
CJIS Policy: Physical Security

CJIS Policy: Physical Security

This module covers the necessary defenses against unauthorized access to your facility and any paper copies of criminal justice information in your possession.

View More
Software Licensing Assessment

Software Licensing Assessment

View More
PHI Life Cycle Assessment

PHI Life Cycle Assessment

View More
FERPA for K-12

FERPA for K-12

In this module, we identify types of information protected by Family Educational Rights and Privacy Act (FERPA) and specific regulations for K-12 institutions.

View More
Gramm-Leach-Bliley Act (GLBA) Assessment

Gramm-Leach-Bliley Act (GLBA) Assessment

View More
Introduction to C-TPAT

Introduction to C-TPAT

The United States imports and exports trillions of dollars’ worth of goods and services every year. This module covers the Customs-Trade Partnership Against Terrorism, or C-TPAT.

View More
CJIS Policy: Media Protection (No Background Music)

CJIS Policy: Media Protection (No Background Music)

This module outlines data-handling best practices, such as avoiding malware, applying encryption and proper disposal of physical media containing criminal justice information.

View More
CJIS Policy: Media Protection

CJIS Policy: Media Protection

This module outlines data-handling best practices, such as avoiding malware, applying encryption and proper disposal of physical media containing criminal justice information.

View More
Handling CJI Assessment

Handling CJI Assessment

View More
CPNI for Providers Assessment

CPNI for Providers Assessment

View More
Introduction To HIPAA

Introduction To HIPAA

This module briefly covers the main points of HIPAA compliance.

View More
Removable Media & PHI

Removable Media & PHI

This module details best practices healthcare professionals can follow to safeguard protected health information and avoid infection from removable media.

View More
Introduction to NIST 800-171

Introduction to NIST 800-171

NIST 800-171 is just one of many federal publications that contractors and companies working with the government are required to comply with. This module will introduce you to NIST 800-171: what it is, and what to do about it.

View More
FAR Code of Conduct

FAR Code of Conduct

Learners will explore the FAR Code of Conduct and the requirements for staying in compliance as a contractor for the federal government.

View More
Introduction to DFARS Assessment

Introduction to DFARS Assessment

View More
Ransomware and HIPAA

Ransomware and HIPAA

This short module will teach learners the risks of ransomware in the healthcare industry, including whether a ransomware infection is considered a HIPAA data breach.

View More
Electronic Funds Transfer Act (EFTA) Assessment

Electronic Funds Transfer Act (EFTA) Assessment

View More
PHI Life Cycle (Video)

PHI Life Cycle (Video)

This video follows PHI from creation to disposal, and covers the specific definitions used by HIPAA to define that life cycle.

View More
Appropriate Use of Software

Appropriate Use of Software

In less than 60 seconds, this module covers how to legally use products of creative software.

View More
PCI DSS Assessment

PCI DSS Assessment

View More
Red Flags Rule

Red Flags Rule

The Red Flags Rule requires financial institutions and creditors to develop written programs, or an Identity Theft Prevention Program, to detect and avoid identity theft.

View More
COPPA Assessment

COPPA Assessment

View More
Media Protection Assessment

Media Protection Assessment

View More
Intellectual Property Rights Assessment

Intellectual Property Rights Assessment

View More
Consequences of PHI Release

Consequences of PHI Release

This brief video walks the learner through the possible consequences of a PHI breach at your organization.

View More
PCI DSS Brief

PCI DSS Brief

This module is an abbreviated version of our core PCI-DSS training. It outlines the six main goals of the PCI-DSS, common threats and best practices for handling credit card data.

View More
Intellectual Property

Intellectual Property

This module covers important intellectual property protection mechanisms (patents, trademarks, and copyrights) and how they apply to various types of products, including software and digital media.

View More
Protecting Federal Tax Information (No Background Music)

Protecting Federal Tax Information (No Background Music)

This module provides an overview of federal tax information (FTI), outlines penalties for unauthorized disclosure, and best practices for avoiding unauthorized disclosure.

View More
HIPAA Assessment

HIPAA Assessment

View More
CPNI for Providers

CPNI for Providers

This security and awareness training covers Customer Proprietary Network Information, or CPNI.

View More
Protecting Federal Tax Information Assessment

Protecting Federal Tax Information Assessment

View More
The Foreign Corrupt Practices Act (FCPA)

The Foreign Corrupt Practices Act (FCPA)

The Foreign Corrupt Practices Act (FCPA) monitors the international business community to prevent occurrence of bribes, kickbacks and other unacceptable business practices. This module defines the FCPA and outlines compliance needs, explores important definitions and provisions of the regulation, and suggests methods to help organizations avoid risks when conducting business with foreign officials.

View More
HIPAA/HITECH for Healthcare Executives

HIPAA/HITECH for Healthcare Executives

This module defines protected health information (PHI), outlines best practices for handling PHI, and explains the role healthcare executives play in ensuring HIPAA compliance by employees.

View More
Complying with NIST 800-171

Complying with NIST 800-171

This security and awareness module will explore the issue of organizational compliance with NIST 800-171 guidelines.

View More
FAR Code of Conduct Assessment

FAR Code of Conduct Assessment

View More
HIPAA Minimum Necessary Standard

HIPAA Minimum Necessary Standard

This brief video extrapolates on how many people are authorized to access one person's health records.

View More
The Family Educational Rights and Privacy Act (FERPA)

The Family Educational Rights and Privacy Act (FERPA)

This module covers the Family Educational Rights and Privacy Act (FERPA), discusses the types of student education record information covered and what must be documented when a FERPA request is made.

View More
Breach Notification for Healthcare Managers

Breach Notification for Healthcare Managers

This module details HIPAA’s definition of a breach, breach disclosure requirements (including an overview of the concept of safe harbor) and recommended breach detection and notification methods.

View More
Protecting Federal Tax Information

Protecting Federal Tax Information

This module provides an overview of federal tax information (FTI), outlines penalties for unauthorized disclosure, and best practices for avoiding unauthorized disclosure.

View More
PHI Definition Assessment

PHI Definition Assessment

View More
Gramm-Leach-Bliley Act (GLBA)

Gramm-Leach-Bliley Act (GLBA)

This module will define the Gramm-Leach-Bliley Act (GLBA), explain its purpose and detail the consequences of non-compliance.

View More
HIPAA HITECH

HIPAA HITECH

Our role-based HIPAA/HITECH module defines Protected Health Information (PHI), explains the need for PHI security and outlines best practices for handling PHI. We’ll also suggest additional resources for PHI-related questions in the workplace

View More
PHI Policy

PHI Policy

This video shows the importance of formulating and implementing organizational policy regarding PHI.

View More
FERPA for Post-Secondary Education

FERPA for Post-Secondary Education

In this module, we identify types of information protected by Family Educational Rights and Privacy Act (FERPA) and specific regulations for post-secondary institutions.

View More
Anti-Money Laundering

Anti-Money Laundering

This interactive module explains money laundering and U.S. laws and regulations intended to combat money laundering activities.

View More
Electronic Funds Transfer Act (EFTA)

Electronic Funds Transfer Act (EFTA)

Almost everyone uses online banking, but there are many ways an electronic fund transfer could go wrong. If someone makes fraudulent charges on your account, what are your responsibilities? What are the bank’s? The Electronic Funds Transfer Act has your back.

View More
Introduction to CCPA Assessment

Introduction to CCPA Assessment

View More
CJIS Security Policy

CJIS Security Policy

This module provides a detailed explanation of Criminal Justice Information Security (CJIS) policy requirements, who must comply with CJIS policy and how to respond to incidents involving CJI.

View More
Breach Notification

Breach Notification

This module details best practices for detecting and reporting unauthorized Protected Health Information (PHI) disclosures. Topics include HIPAA’s definition of a breach, breach disclosure requirements (including the concept of “safe harbor”) and recommended breach detection and notification methods.

View More
CJIS: Handling CJI

CJIS: Handling CJI

This module defines criminal justice information (CJI), the protocols required to access and handle CJI and the consequences of noncompliance.

View More
CJIS Policy: Dissemination & Destruction

CJIS Policy: Dissemination & Destruction

This module outlines how to properly dispose of CJI, how to locate and remove CJI securely, when CJI should be destroyed and best practices for destroying CJI.

View More
Protecting CUI

Protecting CUI

There are fourteen families of controls listed under NIST 800-171, for a total of 110 controls to examine and implement. This module will review those families, covering what they entail and what controls are included in each one.

View More
PHI Definition

PHI Definition

This video explains Protected Health Information (PHI) and provides examples of individually identifiable health information.

View More
Intellectual Property Rights

Intellectual Property Rights

This video delves covers the basics US copyright and trademark laws.

View More
Introduction to CCPA

Introduction to CCPA

This module is an introduction to the California Consumer Privacy Act, or CCPA.

View More
PCI DSS

PCI DSS

This module details the training, policies and procedures required for Payment Card Industry Security Standard (PCI-DSS) compliance for handling branded credit cards from major vendors.

View More
HIPAA/HITECH for Healthcare Managers

HIPAA/HITECH for Healthcare Managers

This module defines protected health information (PHI), outlines best practices for handling PHI and explains the responsibilities of healthcare managers in protecting PHI and ensuring HIPAA compliance.

View More
PHI Policy Assessment

PHI Policy Assessment

View More
Breach Notification Assessment

Breach Notification Assessment

View More
Intellectual Property Assessment

Intellectual Property Assessment

View More
Software Licensing

Software Licensing

This brief video covers the appropriate methods for installing and licensing software.

View More
FERPA Assessment

FERPA Assessment

View More