Data security refers to the process of protecting data from unauthorised access and data corruption throughout its life cycle.  Data security includes data encryption, tokenization, and key management practices that protect data across all applications and platforms. Our course in Data Security Awareness For End User help the end users working in the organisations or departments to protect the important documents, files or data regarding any client with the organisation. This CPD program is important for any organisation (Govt Departments, Security Agencies, Solicitor Firms, Accountants, Healthcare and others) which holds important data regarding their clients or the service provided to them. The organisations are legally bonded by law to protect the identity and any information related to their client, unless and otherwise it is required by Law or on the request/permission of the client.

Topic's Included

  • Introduction
  • Why is Data Security important ?
  • Safe data, safe Service
  • Confidentiality, Integrity, Availability
  • Information and the Law
  • Types of information
  • The Value of Information
  • The Caldicott Principles
  • Confidentiality – Good practice
  • Confidentiality - Informing People
  • Confidentiality - Sharing information for Third Party
  • Data Protection
  • Rights of Individuals
  • Data Protection - Good Practice
  • The Freedom of Information Act 2000
  • Handling FOI requests
  • Record keeping - Good practice
  • Avoiding threats to data security
  • Social engineering
  • The fake ICT Department
  • Social Engineering - what you can do
  • Email phishing and malware
  • Phishing - what to do
  • Malware
  • Good practice - Setting passwords
  • Good Practice - Locking Devices
  • Good practice - Removable drives
  • Good practice - Untrusted websites
  • Good practice - Mobile devices -Digital Do’s
  • Good practice - Mobile devices -Digital Don’ts
  • Good practice - Disposal of confidential information
  • Good practice - Clear desks
  • Breaches and incidents
  • Different types of incident
  • Incidents using technology
  • Consequences of breaches and incidents
  • Reporting incidents
  • Postal breach
  • Postal checklist
  • Email breach
  • Email checklist
  • Phone breach
  • Phone checklist
  • Fax breach
  • Fax checklist
  • Physical Data security risks
  • Summary


Note: - If you want to do the in-house training or a registered charitable organisation or want a group discount for the staff please contact on the below details with one of our staff member.


For in-house training of your staff please contact our admin office.

Graduate School of Management
Third Floor, Vista House, 50 Salisbury Rd
Hounslow, United Kingdom. TW4 6JQ
PH:- +442030049888
Email :- [email protected]

Limited Seats are available book at the earliest....

You may also be interested in...

  • £300.00

    £300.00Culture and Organisation

    Buy Now
  • £400.00

    £400.00Customer & Customer Service

    Buy Now
  • £200.00

    £200.00Developing Personal Skills

    Buy Now
  • £600.00

    £600.00Marketing and Sales Planning

    Buy Now