An email warning the recipient of a computer virus threat.
An email directing the recipient to forward the email to friends.
An email directing the recipient to enter personal details on a fake website made to look legitimate.
An email from your manager about an upcoming meeting.
Credly’s AWS (Amazon Web Services) account
A coworker is attempting to copy company proprietary data without being authorized to do so.
A coworker is downloading a large amount of company information.
Overhearing a coworker constantly expressing their dissatisfaction with working at Credly, and their desire to take adverse actions due to that dissatisfaction.
Overhearing a coworker discuss working for a competitor of Credly.
Place the documents in the recycling bin.
Take the documents home and put them in your personal trash can.
Shred the documents.
Put the documents in the trash can at the office.
Press Windows Key + L
Type LOCK on your keyboard, then press enter
Press Command + Option + Power
Press Command + Option + Eject
Fix the problem on your own.
Notify a member of the Security Council.
Inform local and national media outlets.
Contact the hackers or entities that performed the attack.
Every 30 days.
Every 90 days.
Once Per Year.
Passwords need not be changed if they are automatically generated by a password manager such as “LastPass.”
An earner’s profile information.
A proposal sent to a client.
Your social media posts.
A document describing a client’s credential issuing strategy.
Theft of your company issued laptop.
Intentionally clicking a link in a phishing email.
Accidentally sending sensitive client information to the wrong person.
All of the above.
Locking your screen when stepping away from the computer.
Securely handling sensitive information.
Reporting security incidents.
Installing antivirus software.
When the information is encrypted.
When the information is password protected.
When the password is in a hidden folder.
The information is marked confidential AND a reasonable person would consider it to be confidential.
The information is marked confidential.
The information is marked confidential OR a reasonable person would consider it to be confidential.
A reasonable person would consider the information to be confidential.
Chief Privacy Officer, Chief Security Officer, General Counsel
Chief Security Officer, Chief Privacy Officer, Chief Operating Officer
Chief Privacy Officer, Chief Security Officer, Software Development Manager
Vice President Product, General Counsel, Senior Legal Counsel
It must be changed only if it is compromised.
It cannot contain special character symbols.
It must be registered with the system administrator.
It must be changed on a quarterly basis.
A document must be marked as “confidential” to be treated as confidential under the Credly Written Information Security Policy.
The Credly Written Information Security Policy only applies to information that has never been disclosed to the public.
The Credly Written Information Security Policy covers non-confidential information belonging to Credly’s clients.
The Credly Written Information Security Policy only applies to employees who use earner profile Information.
They cannot be intercepted by unknown users.
They limit accessibility to other users.
They limit visibility to other users.
They can be accessible to other users.
My manager says it is ok.
A member of the Security Council says it is ok.
It has been posted at Credly.com/Subprocessors for at least 30 days.
The product is in wide use or generally well-known.
European Union General Data Protection Regulation (GDPR)
The California Consumer Privacy Act of 2018
The Children’s Online Privacy Protection Act (COPPA)
All of the Above