Internet-based, self-paced training courses
- Identifying and Safeguarding Personally Identifiable Information (PII) DS-IF101.06
This course starts with an overview of Personally Identifiable Information (PII), and protected health information (PHI), a significant subset of PII, and the significance of each, as well as the laws and policy that govern the maintenance and protection of PII and PHI. The course is designed to prepare DOD and other Federal employees to recognize the importance of PII, to identify what PII is, and why it is important to protect PII. The Federal government requires the collection and maintenance of PII so as to govern efficiently. However, because PII is sensitive, the government must take care to protect PII, as the unauthorized release or abuse of PII could result in potentially grave repercussions for the individual whose PII has been compromised, as well as for the federal entity entrusted with safeguarding the PII. This course explains the responsibilities for safeguarding PII and PHI on both the organizational and individual levels, examines the authorized and unauthorized use and disclosure of PII and PHI, and the organizational and individual penalties for not complying with the policies governing PII and PHI maintenance and protection. This training is intended for DOD civilians, military members, and contractors using DOD information systems. This course may also be used by other Federal Agencies.
Training videos, usually in 10 minutes or less, that allows you to refresh your knowledge of a critical topic or quickly access information needed to complete a job
- Social Networking
This interactive presentation provides an introduction to social networking for Department of Defense (DOD) information system users. The presentation acknowledges the positive aspects of social networking, but also familiarizes users with some of the risks associated with social networking services, especially as military, civilian, or contractor members of the DOD.
- Suspicious Emails
Provides an opportunity to practice identifying what constitutes a suspicious email, while increasing awareness about the importance of reporting suspicious contacts.