Our two-day privacy training class is a robust, interactive way to learn the critical privacy concepts that are integral to the Certified Information Privacy Technologist (CIPT) certification exam. Training is appropriate for professionals who plan to certify, as well for those who want to deepen their privacy knowledge. This training in not just a test prep course, nor does taking training guarantee you’ll pass your exam (hey, it’s not that easy).
Privacy in Technology training is the how-to course on privacy and data protection practices I the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices I the context of the design and implementation of information and communication technologies and systems.
The training is based on the body of knowledge for the IAPP’s ANZI-accredited Certified Information Privacy Technology (CIPT) certification program. The CIPT program was developed by the International Association of Privacy Professionals (IAPP), which is the world’s largest comprehensive global information privacy community and resource.
• 2 x 8-hour instructor led training sessions
• Detailed course notes
• Example exam questions
• Exam voucher (valued at US$550)
• 12 months of IAPP Professional Membership (valued at US$275)
You’ll meet great people, gain essential skills and connect with members of IAPP's Professional Privacy Faculty—the best in the business for what they know and how they teach it.
The course is broken into eight modules:
Module 1: Fundamentals of information privacy. Reviews the modern history of privacy, foundational privacy concepts, data protection roles and fair information practices; explores the impacts of privacy and data protection regulations on information management.
Module 2: Privacy in the IT environment. Describes compliance requirements, IT risks, and stakeholder privacy expectations; differentiates between privacy and security.
Module 3: Core privacy concepts. Explains foundational elements for embedding privacy in IT and provides an overview of common privacy principles; summarizes data protection by design and default.
Module 4: Privacy considerations in the information life cycle. Explores privacy considerations throughout the stages of the information life cycle.
Module 5: Privacy in systems and applications. Examines the risks inherent in the IT environment and options for addressing them, including: identity and access management; credit card information and processing; remote access, BYOD and telecommuting; data encryption; and other privacy-enhancing technologies in the enterprise environment.
Module 6: Privacy techniques. Describes the strengths and weaknesses of authentication techniques as well as the use of identifiers; reviews and illustrates privacy by design.
Module 7: Online privacy issues. Explores the unique challenges that come from online privacy issues, including specific laws and regulations, online threats, social media, e-commerce, tracking technologies, and web security protocols.
Module 8: Technologies with privacy considerations. Describes specific privacy considerations associated with a variety of technologies including cloud computing, wireless IDs, location-based services, “smart” technologies, video/data/audio surveillance, and biometric recognition.
Who should attend?
- Data Protection Officers
- Data Protection Managers
- Legal Compliance Officers
- Security Manager
- Information Managers
- Anyone involved with data protection processes and programmes