Posting pictures and videos online

Watch the video from our Posting Pictures and Videos Online course, where Pam has asked for permission and posted pictures and videos of her colleagues online.

You can access the entire course on our e-learning platform by logging in here. If you do not have an account, you can try it for free.

The course

About the course

We live in a time where posting pictures or videos online has become the norm. However, photos and videos of people are also considered personal data, and we should take care of how we handle this. In this course, we will discuss what to keep in mind before posting a photo or video of someone according to the GDPR.

Posting pictures and video online

Summary for blog

In today’s age of social media, people post pictures and videos of themselves and their peers online all the time. When it comes to the GDPR, there are some things one should be aware of before pressing the ‘post’ button. At the end of the blog, we will provide you a flowchart so you will be more confident in knowing if you should be posting or not.

Summary for blog

In today’s age of social media, people post pictures and videos of themselves and their peers online all the time. When it comes to the GDPR, there are some things one should be aware of before pressing the ‘post’ button. At the end of the blog, we will provide you a flowchart so you will be more confident in knowing if you should be posting or not.

Posting pictures and video online

Other material

Create awareness in your organisation with our posters. You can download the posters and hang them on your walls in your organisation.

In this way your employees willl be reminded of what to be aware of when they see a the posters.

cp poster

Related courses

Update 2.0
Category: Cyber security

Updates

Learning objectives: Why updates are necessary for good IT security, and what you need to be aware of in relation to updates

Read More »
Top

Contact us

You are always welcome to contact us
for an initial and informal chat about your cyber security challenges.