Skip Navigation. Hit enter to return to the slide.
Playback Speed
2
1.75
1.5
1.25
Normal
0.75
0.5
0.25
Zoom to fit
Keyboard shortcuts
Menu
Module 1: Introduction
Module 1: Introduction
Welcome and Land Acknowledgement
Welcome and Land Acknowledgement
Navigation
Navigation
Objectives
Objectives
Agenda
Agenda
Module 2: General privacy concepts
Module 2: General privacy concepts
Introduction
Introduction
What is Privacy?
What is Privacy?
Privacy: A Fundamental Right
Privacy: A Fundamental Right
Privacy Rights
Privacy Rights
Privacy Legislation Landscape
Privacy Legislation Landscape
Personal Information
Personal Information
Personal Information - Examples
Personal Information - Examples
Scenario 1
Scenario 1
Scenario 2
Scenario 2
Module Summary
Module Summary
Module 3: Considering privacy in your work
Module 3: Considering privacy in your work
Introduction
Introduction
SOR-RL Security Features
SOR-RL Security Features
SOR-RL Security Features (cont.)
SOR-RL Security Features (cont.)
Your Role in Protecting Personal Information
Your Role in Protecting Personal Information
Data Minimization
Data Minimization
Practicing Data Minimization in SOR-RL
Practicing Data Minimization in SOR-RL
Practicing Data Minimization in SOR-RL (cont.)
Practicing Data Minimization in SOR-RL (cont.)
Accurate and Professional Note-taking
Accurate and Professional Note-taking
What is a Privacy Breach?
What is a Privacy Breach?
Preventing Privacy Breaches
Preventing Privacy Breaches
Proactive Tools for Organization to Safeguard Personal Information
Proactive Tools for Organization to Safeguard Personal Information
Exercise
Exercise
Answers
Answers
Responding to Privacy Breaches
Responding to Privacy Breaches
Responding to Privacy Breaches (cont.)
Responding to Privacy Breaches (cont.)
Access and Correction Requests
Access and Correction Requests
Access and Correction Requests - Response Timelines
Access and Correction Requests - Response Timelines
Module Summary
Module Summary
Module 4: Wrap-up
Module 4: Wrap-up
What We've Covered
What We've Covered
Next Steps
Next Steps
Privacy Training for Service Providers
Privacy Training for Service Providers
Privacy Training for Service Providers
Privacy Training for Service Providers
You are offline. Trying to reconnect...
M
M