Electronic Communications
Emails and instant messages can quickly make headlines, damage reputations and lead to lawsuits. That's why it is important to remind employees about company standards and regulatory requirements.
Electronic business communications should be treated with the same standard of care and attention as one would give hard-copy correspondence.
Our Electronic Communications Training Course will help your employees understand regulatory requirements for digital communication, communicate professionally and avoid common pitfalls.
- 25 Minutes
- All staff
- Based on UK legislation, but suitable for global audiences upon the removal of UK-specific references and translation as necessary.
- Compliance Essentials Library

Learning objectives
- Apply content and tone considerations
- Appropriately use email as business correspondence
- Follow retention and monitoring procedures
- Follow procedures for approved third-party systems
- Recognise information security considerations
- Observe professional conduct
What can you expect your employees to learn?
Introduction
Examples of damaging messages
- Key points
Content & tone considerations
- You decide: Content & tone considerations
Professionalism
Email as business correspondence
Example: Producing evidence
Retention and monitoring
- 'Delete' does not permanently erase data
- Personal use
Using approved third-party systems
Public forums
- Professional conduct
- Anonymity
Information security considerations
- Who needs to know?
- Allow only appropriate access to Company information
Observing professional conduct
Summary
Affirmation
Assessment
Start your compliance e-learning journey with a free trial
Our no-obligation free trial gives you access to our libraries and compliance platform.
Ready to start your free trial? Complete the form, and a member of the Skillcast team will be in touch with further details.
Your questions, answered
Cybersecurity
DORA
CyberFocus
Common FAQs
Where can I track incidents involving personal data?
How can I benchmark my team's cybersecurity awareness?
An anonymous cybersecurity awareness survey can assess your team's understanding of critical security practices. Skillcast offers ready-to-use surveys to benchmark awareness levels and identify areas needing extra focus.
How can I benchmark my team's cyber security awareness?
Are Skillcast courses SCORM-compliant?
What other tools are needed beyond training?
Is our training content still compliant with the latest legislation?
- You can check the latest course content updates in our library updates page: https://www.skillcast.com/compliance-course-library-updates
- For major legislative changes, we:
- Will send you email alerts to ensure you are notified
- Offer you a free trial of newly created or updated content
- Host webinars with compliance experts to explain the changes and how our training supports your ongoing compliance
Can you translate our content into other languages?
How can I give employees a secure way to record suspicious activity so we can act quickly?
Our Suspicious Activity Register allows staff to log concerns or irregularities they observe, helping you detect potential issues early. The secure register can be reviewed by compliance teams, enabling prompt investigation and action.
What file types are supported by the Skillcast system?
Features |
Supported file types and details |
File Exchange |
File types: PDF, Excel spreadsheets, Word documents, SCORM and xAPI files, and compressed zip files. Max file size: Default is 1GB, can be increased to a max of 2GB |
SCORM files |
Versions: SCORM 1.2, SCORM 1.2 for Moodle, SCORM 2004 2nd, 3rd and 4th Edition. Max file size: 1024MB |
xAPI file |
Max file size: 2GB |
Videos |
File types: MP4 or MOV. Videos must be optimised, with a max file size of 100MB. If the file is bigger, our Design Team can help |
Images |
File types: jpg, png and gif. The file size should ideally be 100KB, but it can be up to 250KB |
CPD evidence |
File types: Word, PDF, Excel and CSV. File size: the limit should be whatever the portal config option is set to. Servers are set to max 2GB |
Policy documents |
PDF or Word File size: the limit should be whatever the portal config option is set to. Servers are set to max 2GB |
Offline activities evidence |
File types: PDF, DOC, DOCX, XLS, XLSX, CSV, PNG, GIF, JPEG, JPG, PPTX and MSG. File size: the limit should be whatever the portal config option is set to. Servers are set to max 2GB |
Client logo files |
File types provided by client: EPS, PDF, AI and SVG |
Registers |
PDF, DOC, DOCX, XLS, XLSX, CSV, PPT, PPTX, POT, PPA, PPS, JPG, JPEG, PJEPG, PNG, BMP, GIF, MP4, MOV, WMV, CPTX, CP, TXT, ZIP and MSG files |
Declarations |
JPG, JPEG, PNG, GIF, XLS and XLSX files |
Related courses
Boost your compliance efforts with our range of courses. Varying in length and topic, our courses equip you with the tools to create an ethical and resilient workplace.
Phishing
It's essential for your employees to know what phishing is, how to spot the signs of an attempt and how to protect themselves and your Company.
Information Security
The loss or theft of commercially sensitive information may damage revenues, reputation and consumer trust.
Spot a Phishing Attempt
Bring "Spot a Phishing Attempt" online training to life using animation characters and storylines.
Business Email Compromise
Bring "Business Email Compromise" training to life using animation characters and storylines.
Records Management
Records management refers to employees' creation, storage, archiving, and disposal of business records.
Deepfake Awareness
Bring "Deepfake Awareness" compliance training to life using animation characters and storylines.
Understanding Information Security
Bring "Understanding Information Security" e-learning to life using animation characters and storylines.
Common Cyber Threats
Bring "Common Cyber Threats" online training to life using animation characters and storylines.
Understanding the GDPR
Bring "Understanding the GDPR" online learning to life using animation characters and storylines.
Personal Data Breaches
Bring "Personal Data Breaches" online training to life using animation characters and storylines.
Zero Trust Cybersecurity
Bring "Zero Trust Cybersecurity" online training to life using animation characters and storylines.
Bring Your Own Device Security
Bring "Bring Your Own Device Security" training to life using animation characters and storylines.
Device Hygiene
Bring "Device Hygiene" training to life using animation characters and storylines.
Malware
Bring "Malware" training to life using animation characters and storylines.
Ransomware
Bring "Ransomware" training to life using animation characters and storylines.
Smishing
Bring "Smishing" training to life using animation characters and storylines.
Spear Phishing
Bring "Spear Phishing" training to life using animation characters and storylines.
Video Conferencing
Bring "Video Conferencing" training to life using animation characters and storylines.
Vishing
Bring "Vishing" training to life using animation characters and storylines.
Creating Strong Passwords
Bring "Creating Strong Passwords" training to life using animation characters and storylines.
Multi-factor Authentication
Bring "Multi-factor Authentication" training to life using animation characters and storylines.
Reacting to Password Breaches
Bring "Reacting to Password Breaches" training to life using animation characters and storylines.
Information Classification
Bring "Information Classification" training to life using animation characters and storylines.
Information Security on the Move
Bring "Information Security on the Move" training to life using animation characters and storylines.
Tailgating and Piggybacking
Bring "Tailgating and Piggybacking" training to life using animation characters and storylines.
Secure Web Browsing
Bring "Secure Web Browsing" training to life using animation characters and storylines.
Supply Chain Cybersecurity
Bring "Supply chain cybersecurity" training to life using animation characters and storylines.
Transferring Information Securely
Bring "Transferring Information Securely" training to life using animation characters and storylines.
Using Wi-Fi safely
Bring "Using Wi-Fi safely" training to life using animation characters and storylines.
Advising Customers on Cybersecurity
Bring "Advising customers on cybersecurity" training to life using animation characters and storylines.
CEO Fraud
Bring "CEO fraud" training to life using animation characters and storylines.
Guide to Secure Remote Working
Bring "Guide to Secure Remote Working" training to life using animation characters and storylines.
Think Before You Click
Bring "Think before you click" training to life using animation characters and storylines.
Device security
Risks in the Use of AI
Bring "Risks in the Use of AI" training to life using animation characters and storylines.
Cybersecurity
Records Management
Digital Operational Resilience Act (DORA)
Although you may feel that you treat people equally, sometimes your actions might be perceived differently by others, and lead them to feel uncomfortable or discriminated against.
Information Security
The loss or theft of commercially sensitive information may damage revenues, reputation and consumer trust.
Cybersecurity
Educate your staff on how to recognise cyber security risks, where they are likely to originate, how to combat them, and the support systems your Company has in place in the event of a cyber security incident.