Free

US Information Privacy

Are you overwhelmed by the intricacies of U.S. information privacy and data security laws? Privacy and data security are critical in today’s digital world. Gain the insight you need to navigate the realm of information privacy in the U.S. public and private sectors by taking this U.S. Information Privacy course.
7
3
M
Time
intermediate
difficulty
7
ceu/cpe

Course Content

Family Education Rights and Privacy Act of 1974

11m

Education and Children’s Online Privacy
Federal Trade Commission

10m

US Federal Government Consumer Privacy Protection Enforcement Agencies
NIST Privacy Framework 10: An Overview

11m

The National Institute of Standards and Technology (NIST) and Privacy
OMB Circular A-130, Appendix II and Information Privacy

11m

The US Office of Management and Budget (OMB) and Privacy
The Privacy Act of 1974 Part 1

11m

The US Federal Executive Branch and Privacy
What is Information Policy?

20m

Introduction to US Information Privacy
Introduction to US State Data Breach Notification Laws

10m

US States Data Breach Notification Laws
Consumer Financial Protection Bureau

8m

US Federal Government Consumer Privacy Protection Enforcement Agencies
NIST SP 800-37 Revision 2 and Privacy

12m

The National Institute of Standards and Technology (NIST) and Privacy
OMB Memorandum 03-22 and Privacy

11m

The US Office of Management and Budget (OMB) and Privacy
The Privacy Act of 1974 Part 2

11m

The US Federal Executive Branch and Privacy
US Constitution and Privacy

5m

Introduction to US Information Privacy
Children's Online Privacy Protection Act of 1998

10m

Education and Children’s Online Privacy
Vermont Act of 171: Data Broke Act of 2018

11m

Recent US State Privacy and Security Laws
OMB Memorandum 16-24 and Privacy

10m

The US Office of Management and Budget (OMB) and Privacy
Course Description

Today, it is extremely important for US information privacy professionals to assist their organizations in respecting the individual information privacy rights and freedoms of their customers, employees, and other stakeholders. Additionally, US information privacy professionals must understand completely the role of US information privacy in both the US private sector and the US public sector.

The US Information Privacy course provides students with insights into the role of information privacy with the US public sector. Of note, this course’s purpose is not to serve as a preparation course for any certification examination. Its purpose is to introduce students to the role of information privacy in the US. This courseprovides students with foundationalknowledge of important information privacy concepts and topics. This course introduces students to several key US Federal Government public sector, privacy-related laws.

Moreover, this course provides students with the role of information privacy within the US private sector. This course explores the roles and responsibilities of the Federal Trade Commission (consumer privacy protection) and the Consumer Financial Protection Bureau (consumer financial privacy protection). This course explores the relationship between health information and information privacy. This course explores the relationship betweenfinancial information and information privacy. The course introduces students to children online privacy.

Course Goals

By the end of this course, students should be able to:

  • Understand the origins of US Information Privacy
  • Demonstrate knowledge of the US Federal Government’s information privacy practices
  • Demonstrate knowledge of the US private sector’s information privacy practices
  • Demonstrate knowledge of recently passed US state-level consumer privacy and personal information protection laws
  • * Demonstrate knowledge of several current US state-level data breach notification laws

    This course is part of a Career Path:
    No items found.

    Instructed by

    Instructor
    Chris Stevens

    Chris is a certified Department of Homeland Security Senior Fellow. He has completed the US Intelligence Community’s former “Intelligence Community Officer” certification program. Chris possesses several graduate and undergraduate degrees to include the National Intelligence University’s “Master of Science in Strategic Intelligence” degree.

    Chris Stevens possesses all seven of the International Association of Privacy Professionals’ (IAPP) certifications. He is an IAPP Fellow of Information Privacy. Chris is a member of the IAPP Privacy Faculty, and he served for two years as an IAPP Baltimore, MD Knowledge Net Chapter Co-Chairperson. He is an American Health Information Management Association “Certified in Healthcare Privacy and Security” professional. He is a Healthcare Compliance Association “Certified Healthcare Privacy Compliance” professional. Chris has completed the Loyola University-Chicago School of Law’s “Certificate in Privacy Law” program requirements. He is an ISACA “Certified in Risk and Information Security Controls” professional. He is an ISACA “Certified Data Privacy Solutions Engineer.” He has consulted for several private sector and public sector organizations. He recently concluded assisting the US House of Representatives in maturing its privacy program.

    Chris possesses a Master of Information Resource Management from Central Michigan University. He obtained experience in cybersecurity during his more than 35 years as a military and as a civilian intelligence professional. Chris has taken several cybersecurity courses as a privacy professional and is familiar with several of NIST's computer security, cybersecurity, information security, information technology, privacy, and risk management frameworks, internal reports and special publications. As a privacy consultant, Chris has worked diligently to integrate privacy into several public sector and privacy sector organizations’ cybersecurity strategies.

    Chris has always had a fascination with cybersecurity and information security as an intelligence professional and as a privacy professional. As a SIGINT collector and professional, he familiarized himself with cybersecurity and information security tactics, techniques, and procedures to exploit information systems and network systems to obtain access to data. As a privacy professional, Chris has worked diligently to ensure that public sector and private sector organizations integrate privacy into their cybersecurity and information security strategies.

    "I truly enjoyed working with the Cybrary “Dream Team” throughout the course syllabus creation, course material creation, and video recording phases. Its commitment to course creation and quality assurance also impressed me greatly.

    My personal motto is 'Carpe Diem.' I work hard to complete today’s tasks so that I do not miss out on tomorrow’s opportunities."

    Check out the [“Privacy Legion” Newsletter](https://paper.li/Stevens12Chris/1387375494#/)

    Provider
    Cybrary Logo
    Certification Body
    Certificate of Completion

    Complete this entire course to earn a US Information Privacy Certificate of Completion

    Coming mid-July
    Cybrary Reimagined.
    Level up with structured, role-aligned career paths.
    ALL NEW!
    Cybrary Reimagined.
    Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
    Level up with structured, role-aligned career paths.
    Valid until October 31. Elevate your skills today!
    Start Now

    Heading

    Heading 1

    Heading 2

    Heading 3

    Heading 4

    Heading 5
    Heading 6

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

    Block quote

    Ordered list

    1. Item 1
    2. Item 2
    3. Item 3

    Unordered list

    • Item A
    • Item B
    • Item C

    Text link

    Bold text

    Emphasis

    Superscript

    Subscript

    This is some text inside of a div block.
    Share

    Purpose Statement

    Cybrary Career Paths are comprehensive training programs designed to prepare you for the most in-demand roles in the cybersecurity workforce. Each path follows a Learn, Practice, Prove model and includes different activity types aligned to key topics within the path’s security domain. As you progress through the path, your progress will be measured in real time using Experience Points (XP) that serve as a comprehensive capability score for each topic. Upon completing all of the requirements for a path, you will be rewarded with a shareable digital badge via Credly.
    This is some text inside of a div block.
    This is some text inside of a div block.
    M
    Time
    This is some text inside of a div block.
    difficulty
    This is some text inside of a div block.
    ceu/cpe

    Overview

    Heading 1

    Heading 2

    Heading 3

    Heading 4

    Heading 5
    Heading 6

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

    Block quote

    Ordered list

    1. Item 1
    2. Item 2
    3. Item 3

    Unordered list

    • Item A
    • Item B
    • Item C

    Text link

    Bold text

    Emphasis

    Superscript

    Subscript

    Frequently Asked Questions
    No items found.
    What Will I Learn?
    Foundations
    Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
    Defensive Security
    Focused on trying to find the bad guys. Topics such as threat intelligence, threat hunting, network monitoring, incident response. Defensive security is a reactive measure taken once a vulnerability is found through prevention, detection, and response.
    Engineering and Operations
    Focused on building and operating information systems.
    Governance, Risk, and Compliance
    Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
    Leadership and Management
    Focused on program design and oversight. Covers project and program management.
    Offensive Security
    Focused on validating security controls by trying to break them (i.e. penetration testing or ethical hacking). Topics such as Kali Linux, metasploit, scanning, and privilege escalation. Offensive security seeks out the problem or vulnerability through ethical hacking and finds a solution to disable the operation.
    Offensive Security
    Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
    Path Outline

    Heading 1

    Heading 2

    Heading 3

    Heading 4

    Heading 5
    Heading 6

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

    Block quote

    Ordered list

    1. Item 1
    2. Item 2
    3. Item 3

    Unordered list

    • Item A
    • Item B
    • Item C

    Text link

    Bold text

    Emphasis

    Superscript

    Subscript

    Course Outline

    No items found.
    No items found.
    No items found.

    What Our Learners Are Saying

    Join 3 million+ users, including 96% of Fortune 1000 companies who use our platform to upskill their teams. See what the buzz is about - start learning for free!

    No items found.