Health Privacy – Australia

Course Description

Ensuring the integrity of sensitive health information

Product Description

Compliance with privacy laws is crucial to maintaining customer trust, particularly in the health sector where organisations are constantly under scrutiny for misuse or mishandling of sensitive information such as medical records. With data breaches on the rise, health service providers and other organisations are, now more than ever, prioritising the proper handling of personal and health information.

This course takes learners through the lifecycle of personal information, from collection, use and disclosure, storage, access and correction, and their privacy law obligations at each stage. We use accessible language and practical scenarios to explain and illustrate technical concepts in an engaging way. The introductory module summarises key concepts for front line staff. Subsequent modules explore the Health Privacy Principles (HPPs) in more detail. We also look at mandatory data breach reporting requirements and what to do when an incident arises.

Customer privacy is one of health sector organisations’ biggest operational risks, and this course features real-life cases highlighting the major industry concerns, what organisations are doing right and what they could be doing better

New Update!

We keep our training up to date so that you don’t have to worry about your compliance with the latest developments.

In December 2022 the Australian Government, in response to the Optus data breach and others, passed the Privacy Legislation Amendment (Enforcement and Other Measures) Act 2022, which introduced major financial penalties for both individuals and organisations in relation to privacy breaches. Some penalties are now 20 times as large as they were before – or more.

The new law also significantly expands the Australian Information Commissioner’s powers.

Our training reflects this new legislation.

Who should do this training?

This training is designed for staff at any level within an organisation that comes in contact with private information or could be at risk of breaching Australian privacy laws.

For more information on other GRC Solutions’ privacy training resources:

Australia

Privacy – Covering the Privacy Act and the Australian Privacy Principles

Privacy for Schools – Covering the Privacy Act and the Australian Privacy Principles as they apply to schools

Australia – Financial Services

Financial Services Privacy Training – covering the Privacy Act and the Australian Privacy Principles

Credit Reporting – covering the Credit Reporting Act

New Zealand

Privacy – New Zealand – covering privacy in New Zealand under the 2020 updates to the law

Europe

General Data Protection Regulation – covering the GDPR – which has global implications

Singapore

Data Protection Singapore – covering the Personal Data Protection Act 2012 and also the implications of the GDPR

Malaysia

Data Protection Malaysia – covering the Personal Data Protection Act 2010 and also the implications of the GDPR

California

California Consumer Privacy Act

Course Outline

  • Module 1: Introducing privacy
  • Module 2: Management and collection
  • Module 3: Use or disclosure
  • Module 4: Storage, access and correction
  • Module 5: Credit reporting obligations

Workplace Health & Safety – New Zealand

Course Description

Everyone who goes to work should come home from work safely. But hundreds of people are still seriously injured or die from work-related diseases in New Zealand every year.

Based on the Australian model work health and safetylaws, the new Health and Safety at Work (HSW) Act (2015) emphasises the role of safety leadership and management responsibility in identifying and eliminating risks to workers’ safety. It also highlights the need for people within a business to cooperate and collaborate with each other to reduce the number of workplace injuries and deaths.

Course Outline

  • Module 1: Health and safety at work
  • Module 2: Workers’ rights and obligations
  • Module 3: Duties of PCBUs
  • Module 4: Compliance and enforcement measures
  • Module 5: Duties of officers
  • Module 6: Health and Safety Representatives and Health and Safety Committees

Incident Management

Course Description

This course explores what an incident is and how to address it, from building an incident management register, to collecting and interpreting data within it. Depending on what kind of incident has taken place, different types of registers can be used to record the event. This information can then form the basis for making a targeted response, in which incident-related issues are escalated to the relevant people at the appropriate time.

Who is this training for?

This course applies to anyone in the workplace – including compliance and risk managers, senior management or other employees – who may be in a position to observe, record or respond to incidents within their organisation.

Course Outline

Module 1 : Defining Incident Management

• The objectives of incident management process

• The types of registers

• How Incident Management fits into the overall risk management framework

Module 2 : Incident Management Inputs

• Building an incident management register

• Linking risk causes, risk events and controls to incidents

Module 3 : Incident Management Processes

• Collecting incident-related information

• Aggregating incident data to produce summary data

Module 4 : Incident Management Outputs

• The types of reports

• Notification and escalation emails

• Using reports and taking action

Key Risk Indicators (KRIs)

Course Description

Key Risk Indicators (KRIs) are observable and measurable information that can be used to

identify the symptoms and “red flags” created by risks. This course explores how to identify KRIs in your organisation, linking them to both the risks and the

controls necessary to contain them. It examines how to collect, score and find patterns in KRIs across different units in your organisation. And it looks at the steps employees can take to report and escalate issues about KRIs to the appropriate management or committees within the organisation.

Who is this training for?

This course applies to all organisations looking to manage risks in their business by identifying the “red flags” of risk and taking action.

Course Outline

Module 1 : Defining Key Risk Indicators (KRI’s)

• What are KRIs?

• Objectives of KRIs?

• Types of KRIs

• Identifying KRIs

Module 2 : KRI Inputs – Determining the parameters

• Assigning KRIs

• Setting frequency

• Determining thresholds

• Linking KRIs to risks and controls

Modeule 3 : KRI Processes – Collection, scoring and Aggregation

• Collecting KRIs

• Scoring KRIs

• Aggregating KRIs

Module 4 : KRI Outputs – Reporting and Follow-up Process

• Reporting KRIs

• Notifying and escalation issues relating to KRIs

• Using reports and taking action

Mental Health in the Workplace

Course Description

Mental Health in the Workplace

Understanding mental health for our professional and personal lives

1 in 5 Australians will experience a mental health condition in any year. 45% of Australians aged between 18 and 85 will experience a mental health condition in their lifetime. Mental health issues can impact our workplaces, and our workplaces can likewise impact people’s mental health.

The World Health Organisation offers a definition of mental health as a state of wellbeing in which we can realise our own abilities, work productively and contribute to our communities. While experiencing stress and a range of emotions are normal, there are times when we may find it difficult to shift out of a low mood or cope with regular stresses – and this may indicate the presence of mental health issues or a diagnosable condition.

Wherever we work, mental health is something we must prioritise and value. Employers are required to actively manage health and safety risks in the workplace. In some states and territories, this includes risks to mental health as well as physical health.

GRC Solutions offers this fully customisable course on Mental Health on the Workplace to help individuals understand and identify common mental health issues, to provide support to co-workers who may be experiencing mental health issues and to play their part in breaking down stigmas surrounding mental health.

Who is this training for?

This module is designed to be accessible for anyone in an organisation.

Mental health is important, no matter your role.

Course Outline

  • Defining mental health
  • Effects of poor mental health for individuals and society
  • Signs of mental health issues
  • Supporting people
  • Building a mentally healthy workplace

Third Party Risk

Course Description

This course guides you through the four steps associated with  handling  third  party  risk:  scoping,  risk  assessment,  due diligence and approval/post-approval risk mitigation.The  lessons covers  major  international  anti-corruption  laws,   including   the   US   Foreign   Corrupt   Practice   Act   (FCPA) and the UK Bribery Act. Jargon is kept to a minimum. Where possible, stories are used to paint a vivid picture.

Who is this training for?

Employees at all levels need to recognise the risks associated with third parties and how to identify them. This course guides staff through the four steps associated with handling third party risk.Management are trained to identify, minimise and handle corruption risks. General employees learn the role they play in ensuring that due diligence occurs.

Course Outline

Module 1 : Introducing Third Party Risk

   •The role of third party due diligence in your organisation’s ABC obligations

   •Scope of due diligence

   •Key corruption risk factors

   •Organisational benchmarks regarding third party risks

   •Assessing corruption risk as high, medium or low

Module 2 : Due Diligence and Approvals

   •The data collection process

   • Key aspects of third parties to research

   •Validating research• Monitoring third parties post-approvals

   •Supporting due diligence and anti-corruption processes

Module 3 : Due Diligence for Employees

   •The role of third party due diligence in your organisation’s ABC obligations

   •Key corruption risk factors

   •The due diligence process

   •Monitoring third parties post-approvals

   •The function of whistle-blower policies

Tax File Number and Withholding Tax

Course Description

  • The procedure for collecting TFNs
  • The application of withholding tax where a TFN is not quoted
  • The TFN and withholding tax rules for special customers

Sanctions Compliance Training

Course Description

This course will help you understand what economic sanctions are, how they work and how they impact international business and the financial services sector in particular.

Sanctions are volatile and often there is little or no advance warning.

This training is indispensable for enhancing your general knowledge of the purpose and nature of sanctions regimes, explaining what they are used for and how they can affect lives and businesses.

As economic sanctions continue to feature in the news headlines, this course provides practical insights into managing sanctions compliance and engaging with clients, mapping out what you should know, what you should do and what you should have in place to be compliant.

Who should do this training?

This course is especially relevant to account directors, business development managers, operations specialists, risk management analysts, compliance officers, customer due diligence analysts and senior executives.

Download course outline here

Specialized Financial Economic Crime Training

GRC Solutions is thrilled to collaborate with leading financial crime advisory firm, i-KYC, pairing their premium content library with our award-winning Salt Learning technologies to improve your approach to addressing Financial Economic Crime (FEC).

Download our brochure here

Course Outline

Module 1: Describe what sanctions are, their purpose, key features and reach

Module 2: Identify which sanctions regimes are the most important and how they can impact businesses

Module 3: Outline key sanctions do’s and don’ts

Module 4: Respond to client queries about sanctions

Risk and Control Self-Assessment (RCSA)

Course Description

Risk and control self-assessment (RCSA) involves identifying, recording and assessing the risks that

an organisation may encounter, as well as the controls in place to contain them. It covers several steps, from identifying the risks to which an organisation or business may be exposed to escalating and taking follow-up action and identifying ongoing issues that affect risks. This course explains what an RCSA is and how to construct, use and report on it

Who is this training for?

You should complete this course if you are involved in a compliance or risk management function in your workplace

Course Outline

Module 1 : Defining Risk and Control Self-Assessment (RCSA)

   • Objectives of RCSA

    • Components used in an RCSA

    • How the RCSA fits into the risk management framework

Module 2 : RCSA Inputs – Risks, Control, Scales

    • Identifying and recording risks in a register

    • What are risk controls?

    • Recording controls and building a control library

    • Developing control effectiveness scales

Module 3 : RCSA Processes

   • Assessing risks

   • Assessing the effectiveness of risk controls

   • Approaches to self-assessing risk levels

Module 4 : RCSA Outputs – Reporting and Follow-up Process

   • Reporting risks

   • Notifying and escalating report information

   • Using reports and taking action

Proliferation Financing Awareness Training

Course Description

Stakeholders in the financial sector need to understand Proliferation Financing and its consequences

The proliferation of weapons of mass destruction (WMD), including their means of delivery, is a significant threat to global security. Proliferation and its financing are quickly evolving as threat actors find innovative ways of disguising the funding using complex web structures.

This single-module course introduces staff to the concept of Proliferation Financing (PF) and then develops their understanding of how PF works, how it is developing, and the threat it poses to the world. It makes clear how PF differs from money laundering, and how financial services businesses in all countries can be exposed to the risk of having their systems misused to facilitate PF. It contains details on the problems posed by dual use goods.

The lesson provides practical tips and examples to assist in identifying transactions that should be subjected to closer examination. These practical examples empower employees to act in line with their legal and ethical obligations.

Who should do this training?

This course is suitable for customer-facing staff, their managers, and other operational staff who deal with financial transactions.

Download the course outline here

Specialized Financial Economic Crime Training

GRC Solutions is thrilled to collaborate with leading financial crime advisory firm, i-KYC, pairing their premium content library with our award-winning Salt Learning technologies to improve your approach to addressing Financial Economic Crime (FEC).

Course Outline

  • What is Proliferation Financing?
  • Why is the prevention and detection of Proliferation Financing important?
  • What is the Proliferation Financing process?
  • What are the high risk countries for Proliferation Financing?
  • Red flags