Description
“The weakest link in the security chain is the human being.”
–
Kevin David MITNICK (The first hacker to make the FBI’s most wanted list)
Security is often an illusion.
Danger can come when you least expect it, from places you least expect it.
“Only two things are eternal, the universe and human stupidity, and I’m not so sure about the eternity of the former.”
–Albert EINSTEIN
With the increasing masses of information stored in the virtual environment with the developing technology, the protection of this information has become an important issue day by day due to its importance.
The Law on the Protection of Personal Information (KVKK) entered into force on April 7, 2016 in line with the directives of the European Union numbered 6698.
In addition to the advanced defense mechanisms of technology, users also need to be aware. This training teaches important information on how to ensure one’s own information security in general. In addition to teaching how to take action against the threat possibilities and risks that a person may face in the virtual environment, it also shows what measures can be taken on these critical issues.
With this training, it is aimed to convey the application area of KVKK and the obligations it brings to the participants.
About Education
Education Objectives
- To learn about antivirus programs,
- To learn about providing information security,
- To be able to identify computer viruses,
- Raising awareness about children’s safe use of the internet,
- To be able to give examples of security measures,
- To gain awareness about the use of social media,
- To gain awareness about Social Engineering Methods.
Education Content
- Development of personal data protection law in Turkey
- Purpose and scope of the Law on the Protection of Personal Data
- Definition of personal data and sensitive personal data and processing conditions
- Processes of deletion, destruction or anonymization of personal data
- Conditions for the transfer of personal data
- Obligations of the data controller and rights of data subjects
- Personal Data Protection Authority and its powers
- Penalties under Law No. 6698 on the Protection of Personal Data
- Preparation of personal data inventory
- Verbis registration process
- Policies, procedures and other documentation required to be prepared under the Law on the Protection of Personal Data
- Information about BS 10012 Personal Information Management System
Who Should Receive the Training?
- Anyone who wants to improve their security and does not want to be a “weak link”.
Plan this training institutionally!
This training can be planned in different durations and content specific to your organization. Please contact us for detailed rich content and planning to realize your training objectives.