Data protection & Privacy

About this Course

This section contains training modules related to safely storing, backing up, and protecting important or sensitive data, and practices which training participants can adopt to perform regular data backups, create stronger passwords, and make informed decisions around how and where they keep their data. Topics addressed include data backup procedures, creating and managing multiple strong passwords, and detailed options for data storage.


During this module, the participants will gain an understanding of the following key topics:
•Backing up data.
•Understanding information maps.
•Understanding the role of encryption in data protection.
•Vulnerability to data security.

Tools Required


These tools will be necessary for the trainer
to prepare before conducting the training.


These tools will be necessary for the trainee
to have during the training.

•Internet access

•USB flash drive
•Suitable space
•Colored electric tape
•Hands-on guides
•Post-it notes (multiple colors)
•Markers (multiple colors)
•Flip-chart paper



Data Type – It can be many things (point to the matrices for examples). Many users decide to back up an entire device
instead of having tailored backup plans for different data types; others may need to create specialized backup policies.
Specialized policies are especially important for particular data types due to issues related to the sensitivity of the
data, travel (particularly crossing borders), and the amount of changes to one data type versus another over time (e.g.,
a large volume of video editing or sound recordings, an organization’s email database).
Master Copies – The “original” version of the data – for example, the original photo or video taken, the first version of a
document, etc. For most people, this would be whatever is on their laptop or their mobile device.
Duplicates – Backup version of the master, or original, copy of the data in question.
Backup Location – This is where a data backup is physically located – this can refer to everything from a laptop hard
drive or USB drive to an email account or cloud storage account.
Storage Device – This could be an external hard drive, a corporate cloud service (Google Drive, Dropbox), your own
Online server (ownCloud), or a small portable storage device like a USB flash drive.
Information map – A research-based method for writing clear and user focused information, based on the audience’s
needs and the purpose of the information.
Encryption – This process converts the original representation of the information, known as plain-text, into an alternative
form known as cipher-text. Under encryption only intended recipients can open the email or text. This happens when a
set of keys private and public keys are created and only a public key is exchanged with the other party.
Cloud – A cloud is just a server that’s located out of your physical reach but can be accessed with the use of an
internet network.

Course Content

Expand All
Lesson Content
0% Complete 0/1 Steps
Lesson Content
0% Complete 0/1 Steps
Lesson Content
0% Complete 0/1 Steps
Lesson Content
0% Complete 0/1 Steps
1 of 2