You must register and enroll in the course before you view the lessons.
First, click “Register” to create a username or log in, then click “Take This Course” above to enroll in the course.
Please note the following IDOI requirements
When taking a Self-Study examination, the student must do all of the following:
- Sign an affidavit, supplied by the provider that states that the Navigator did not use outside help, such as an open textbook or another individual, in taking the examination.
- A second certified Navigator must sign the affidavit verifying that the second Navigator witnessed the first Navigator’s examination and no outside help was used.
You must fill out and submit this form at the end of the course: Navigator Self-Study Affidavit
If you do not have access to a second Certified Navigator, you can schedule a proctored exam session HERE.
When You Will Come in Contact With PII You will likely collect, disclose, access, maintain, store, and/or use consumers’ PII each time you help them with the following: • Create a Marketplace or FSSA Benefits Portal account • Complete the eligibility process and submit an application for coverage • Assess options for lowering costs of coverage • […]
Consent Form The record of a consumer’s consent is one of the most important documents you will use in your work with consumers. Before you assist consumers, you must discuss your roles and responsibilities with them and obtain consent to access their PII. This is sometimes called getting the consumer’s authorization. Your organization is free […]
Conducting Outreach Contact Cards If a consumer gives you contact information, such as by filling out a contact card or sign-up sheet at a community outreach event, this is considered consumer consent for future contact as long as the consumer was made aware the information might be used for future contact. In this case, follow-up contact with the […]
Privacy is the consumer’s right to control how their personal information is used or disclosed. Confidentiality means respecting your limitations when accessing or disclosing a consumer’s information. You should abide by relevant laws and safeguard consumers’ personal privacy and proprietary information. Key Points PII is a type of information that can be used to […]
Threats It’s essential that any device you use are protected from harmful programs, applications, and malware (malicious software). You may occasionally assist consumers using public devices (like those in libraries). In these instances, you should never save private files to a public computer to upload to an application because it could lead to PII being mistakenly disclosed. Malware is […]
In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. However, by asking questions he or she may be […]
The Importance of Strong Passwords You probably use personal identification numbers (PINs), passwords, or passphrases every day: from getting money from the ATM or using your debit card in a store, to logging in to your email or into an online retailer. Tracking all of the number, letter, and word combinations may be frustrating, but […]
A breach is a privacy incident that poses a risk of harm to applicable individuals. Data does not need to be accessed for a breach to occur. If you learn of a situation in which a consumer’s PII has been compromised in any way, including unauthorized persons seeing or possessing the information or losing the records, it must be addressed immediately. […]
How can you reduce the amount of spam? Be careful about releasing your email address. Think twice before you respond to any request for your email address, on the web, verbally, or on paper. Spammers can harvest any email address posted on a website. If you give your email address to a company, that information is […]
Why is it important to dispose of electronic devices safely? In addition to effectively securing sensitive information on electronic devices, it is important to follow best practices for electronic device disposal. Computers, smartphones, and cameras allow you to keep a great deal of information at your fingertips, but when you dispose of, donate, or recycle […]
If an organization wants to have a secure website that uses encryption, it needs to obtain a site, or host, certificate. There are two elements that indicate that a site uses encryption: A closed padlock, which, depending on your browser, may be located in the status bar at the bottom of your browser window or […]
Patches are software and operating system (OS) updates that address security vulnerabilities within a program or product. Software vendors may choose to release updates to fix performance bugs, as well as to provide enhanced security features. How do you find out what software updates you need to install? When software updates become available, vendors usually […]
Only store hard-copies of PII in locked file cabinets and offices and electronic PII on secure systems. Only grant access to secure areas and computer systems to authorized individuals. Improve password security. Passwords are one of the most vulnerable cyber defenses. Improve your password security by doing the following Create a strong password. Use a strong password that […]
When taking a Self-Study examination, the student must do all of the following: Sign an affidavit, supplied by the provider that states that the Navigator did not use outside help, such as an open textbook or another individual, in taking the examination. A second certified Navigator must sign the affidavit verifying that the second Navigator […]
Click “Complete Lesson” after you submit your information. Click “Complete Lesson” after you submit your information.