PCI Data Security Standard
PCI Data Security Standard (PCI-DSS) is the information security standard for organisations that process credit card payments. Our PCI Data Security Standard Course will help your staff understand the standard, the key requirements and how to identify what's needed to ensure compliance.
- 60 Minutes
- For all staff
Learning objectives
- Raise your awareness of the Payment Card Industry Data Security Standard (PCI DSS)
- Appreciate why it is important
- Recognise the key requirements
- Identify what action you need to take to ensure compliance
Start your compliance e-learning journey with a free trial
Our no-obligation free trial gives you access to our libraries and compliance platform.
Ready to start your free trial? Complete the form, and a member of the Skillcast team will be in touch with further details.
Your questions, answered
Data Protection (GDPR)
Common FAQs
Where can I track incidents involving personal data?
How can I ensure that employees formally attest to our internal Data Protection Policy?
What makes a password secure?
What is a passphrase, and is it better than a password?
How can organisations help staff manage secure passwords?
What exactly must be included in a DSAR response under GDPR?
- Purposes of processing
- Types of personal data involved
- Recipients of data (including third countries)
- Retention period or criteria
- Data source (if not collected directly)
- Rights to rectification, erasure, restriction, or to object
- Right to lodge a complaint with a supervisory authority
- Automated decision-making logic and consequences
Can I ask for identification before fulfilling a DSAR?
How is the one-month response deadline calculated precisely?
When and how can the response deadline be extended?
A controller can extend the deadline by up to two months if the request is complex or the data subject has submitted multiple rights requests simultaneously (e.g., access, erasure, portability). However, the extension must be issued within the initial one-month period, providing reasons for the delay.
How is data privacy different from data security?
Who is responsible for data privacy in compliance training?
What is multi-factor authentication?
What is the difference between MFA and 2FA?
How to log in with MFA?
Are Skillcast courses SCORM-compliant?
What other tools are needed beyond training?
Is our training content still compliant with the latest legislation?
- You can check the latest course content updates in our library updates page: https://www.skillcast.com/compliance-course-library-updates
- For major legislative changes, we:
- Send you email alerts to ensure you are notified
- Offer you a free trial of newly created or updated content
- Host webinars with compliance experts to explain the changes and how our training supports your ongoing compliance
Can you translate our content into other languages?
What file types are supported by the Skillcast system?
Features |
Supported file types and details |
|
File Exchange |
File types: PDF, Excel spreadsheets, Word documents, SCORM and xAPI files, and compressed zip files. Max file size: Default is 1GB, can be increased to a max of 2GB |
|
SCORM files |
Versions: SCORM 1.2, SCORM 1.2 for Moodle, SCORM 2004 2nd, 3rd and 4th Edition. Max file size: 1024MB |
|
xAPI file |
Max file size: 2GB |
|
Videos |
File types: MP4 or MOV. Videos must be optimised, with a max file size of 100MB. If the file is bigger, our Design Team can help |
|
Images |
File types: jpg, png and gif. The file size should ideally be 100KB, but it can be up to 250KB |
|
CPD evidence |
File types: Word, PDF, Excel and CSV. File size: the limit should be whatever the portal config option is set to. Servers are set to max 2GB |
|
Policy documents |
PDF or Word File size: the limit should be whatever the portal config option is set to. Servers are set to max 2GB |
|
Offline activities evidence |
File types: PDF, DOC, DOCX, XLS, XLSX, CSV, PNG, GIF, JPEG, JPG, PPTX and MSG. File size: the limit should be whatever the portal config option is set to. Servers are set to max 2GB |
|
Client logo files |
File types provided by client: EPS, PDF, AI and SVG |
|
Registers |
PDF, DOC, DOCX, XLS, XLSX, CSV, PPT, PPTX, POT, PPA, PPS, JPG, JPEG, PJEPG, PNG, BMP, GIF, MP4, MOV, WMV, CPTX, CP, TXT, ZIP and MSG files |
|
Declarations |
JPG, JPEG, PNG, GIF, XLS and XLSX files |
What is Aida and how does it ensure reliable answers?
Can administrators see what questions are asked and how Aida responds?
Related courses
Boost your compliance efforts with our range of courses. Varying in length and topic, our courses equip you with the tools to create an ethical and resilient workplace.
Privacy and Electronic Communications Regulations (PECR)
PECR are new regulations that, along with the GDPR and Data Protection Act 2018 (in the UK), give consumers specific rights in respect of electronic communications.
Understanding the GDPR
The General Data Protection Regulation (GDPR) sets out key principles for handling personal data and protecting individuals' rights.
Personal Data Breaches
Personal data breaches can occur through hacking, human error or unauthorised access, leading to serious legal and reputational consequences.
Data Protection Impact Assessments
Data Protection Impact Assessments (DPIAs) are used to evaluate our data processing activities and mitigate risks to individuals.
Controllers and Processors
The differences between data controllers and data processors are crucial to understanding data protection obligations.
Special Category Data
In many workplaces, sensitive data, including special category data, is collected and requires extra care.
GDPR Principle 1
The first principle of the GDPR requires that personal data must be processed lawfully, fairly and transparently.
GDPR Principle 2
The second principle of the GDPR, purpose limitation, requires that personal data be collected for specified, explicit and legitimate purposes.
GDPR Principle 3
The third principle of the GDPR, data minimisation, requires that personal data collected must be adequate, relevant and limited to what is necessary.
GDPR Principle 4
The fourth principle of the GDPR, accuracy, requires that personal data must be correct, up to date and not misleading.
GDPR Principle 5
The fifth principle of the GDPR, storage limitation, requires that personal data be retained only for as long as necessary for its intended purpose.
GDPR Principle 6
The sixth principle of the GDPR, integrity and confidentiality, requires that personal data be protected against unauthorised access, loss or damage.
GDPR Principle 7
The seventh principle of the GDPR, accountability, requires organisations to take responsibility for compliance and demonstrate good governance in data protection.
GDPR and Consent
Consent is one of the six lawful bases for processing personal data under the GDPR, requiring individuals to give clear, informed and voluntary agreement.
GDPR Lawful Bases for Processing
The General Data Protection Regulation (GDPR) requires organisations to have a lawful basis for processing personal data, chosen from six legal grounds.
GDPR Legitimate Interests
Legitimate interests is a flexible lawful basis for processing personal data, but it requires balancing business needs with individuals' rights.
GDPR International Transfers
The international transfer of personal data is restricted to ensure individuals' privacy rights are protected when data is sent abroad.
GDPR Individual Rights
The General Data Protection Regulation (GDPR) grants individuals eight specific rights over their personal data, ensuring transparency and control.
GDPR Subject Access Requests
Individuals have the right to access their personal data and organisations must respond to subject access requests (SARs) within legal timeframes.
Legitimate Interest Assessments
When relying on legitimate interests as a legal basis for processing personal data, you are taking on additional responsibility for protecting people's rights and interests.