SlideShare a Scribd company logo
1 of 16
Download to read offline
IAPP Certification Programs:
Overview
02.01.2019
About IAPP
• https://iapp.org
• The International Association of Privacy Professionals (IAPP) is the
largest and most comprehensive global information privacy
community and resource, helping practitioners develop and advance
their careers and organizations manage and protect their data.
• Founded in 2000
2
Type and cost:
• Professional – 275$
• Student – 50$
• Non-For-Profit / Retired / Government / Higher Education – 100$
3
IAPP Certification Programs
• Asia (CIPP/A)
• Canada (CIPP/C)
• Europe (CIPP/E)
• U.S. private-sector (CIPP/US)
• Government (CIPP/G)
CIPP/E + CIMP = GDPR Ready Bundle
4
5
The CIPP shows that you
understand the laws,
regulations and standards of
privacy in your jurisdiction or
discipline.
The CIPP is for you if you’re
responsible for:
• Legal
• Compliance
• Information management
• Data governance
• Human Resources
The CIPM says that you
understand how to use
process and technology to
manage privacy in an
organization—regardless of
the industry or jurisdiction.
The CIPM is for you if you’re
responsible for:
• Risk management
• Privacy operations
• Accountability
• Audit
• Privacy analytics
The CIPT shows that you
know how to manage and
build privacy requirements
and controls into technology.
The CIPT is for you if you’re
responsible for:
• Information technology
• Information security
• Software engineering
• Privacy by Design
Price and Questions
The IAPP’s CIPP/E, CIPP/US, CIPM and CIPT credentials are accredited by the American
National Standards Institute (ANSI) under the International Organization for
Standardization (ISO) standard 17024:2012.
6
About testing
• The IAPP offers two distinct testing modes—event-based paper-pencil
testing at our major conferences and test center computer-based testing.
Exam content is identical regardless of mode. Computer-based exams can be
purchased at any time through the IAPP Store. Event paper-pencil exams can
only be purchased through the registration process of the conference with a
fixed testing date and time and do not need to be scheduled.
• All IAPP examinations are administered in English. In addition, the CIPP/E
exam is available in French and German.
• Certification is a two-year term starting the day a candidate passes their
exam. During this term, certificants are expected to maintain certification by
submitting Continuing Privacy Education credits (CPE’s) -
https://iapp.org/certify/cpe-policy (min 20 credit hours of CPE)
7
Code of Professional Conduct (IAPP)
All IAPP certified individuals must agree to comply with the Certificant Code of
Professional Conduct as outlined below. Accordingly, by signing below you hereby
represent, warrant and covenant to the IAPP as follows:
• You will at all times conduct your business and/or professional activities with
courtesy, honesty and integrity.
• You will at all times represent your IAPP related certifications and qualifications
honestly and agree to only undertake those activities that you can reasonably
expect to complete with the necessary skills, knowledge and competence.
• You will not represent any IAPP certification in a misleading way or use an IAPP
certification in a manner that would bring the IAPP disrepute.
• You will strive to maintain and improve your professional knowledge and
competence through regular self-assessments and continuing education or
training.
• You will follow all certification policies, procedures, guidelines and requirements
of the IAPP that are made available to you by the IAPP, as the same may be
amended from time to time.
8
CIPP/E - Certified Information Privacy Professional
Developed in collaboration with the law firms, Bird and Bird, Field
Fisher, Wilson/Sonsini and Covington and Burling, the CIPP/E
encompasses pan-European and national data protection laws, key
privacy terminology and practical concepts concerning the protection
of personal data and trans-border data flows.
WHAT YOU'LL LEARN
• Introduction to European Data Protection
• European Regulatory Institutions
• Legislative Framework
• Compliance with European Data Protection Law
and Regulation
• International Data Transfers
9
I. Introduction to European Data
Protection
A. Origins and Historical Context of Data
Protection Law
B. European Union Institutions
C. Legislative Framework
III.Compliance with European Data
Protection Law and Regulation
A. Employment Relationship
B. Surveillance Activities
C. Direct Marketing
D. Internet Technology and
Communications
II. European Data Protection Law and
Regulation
A. Data Protection Concepts
B. Territorial and Material Scope of the
General Data Protection Regulation
C. Data Processing Principles
D. Lawful Processing Criteria
E. Information Provision Obligations
F. Data Subjects’ Rights
G. Security of Personal Data
H. Accountability Requirements
I. International Data Transfers
J. Supervision and enforcement
K. Consequences for GDPR
violations
CIPP/E Domains
10
CIPM - Certified Information Privacy Manager
The CIPM is the world’s first and only certification in privacy program
management. When you earn a CIPM, it shows that you don’t just
know privacy regulations—you know how to make it work for your
organization. In other words, you’re the go-to person for day-to-day
operations when it comes to privacy.
WHAT YOU'LL LEARN
• How to create a company vision
• How to structure the privacy team
• How to develop and implement a privacy program framework
• How to communicate to stakeholders
• How to measure performance
• The privacy program operational lifecycle
11
I. Privacy Program Governance
A. Organization Level
• a. Create a company vision
• b. Establish a privacy program
• c. Structure the privacy team
B. Develop the Privacy Program Framework
• a. Develop organizational privacy policies,
standards and/or guidelines
• b. Define privacy program activities
C. Implement the Privacy Policy Framework
• a. Communicate the framework to internal
and external stakeholders
• b. Ensure continuous alignment to applicable
laws and regulations to support the
• development of an organizational privacy
program framework
D. Metrics
• a. Identify intended audience for metrics
• b. Define reporting resources
• c. Define privacy metrics for oversight and
governance per audience
• d. Identify systems/application collection
points
II. Privacy Operational Life Cycle
A. Assess Your Organization
• a. Document current baseline of your privacy
program
• b. Processors and third-party vendor
assessment
• c. Physical assessments
• d. Mergers, acquisitions and divestitures
• e. Conduct analysis and assessments, as
needed or appropriate
B. Protect
• a. Data life cycle (creation to deletion)
• b. Information security practices
• c. Privacy by Design
C. Sustain
• a. Measure
• b. Align
• c. Audit
• d. Communicate
• e. Monitor
D. Respond
• a. Information requests
• b. Privacy incidents
12
CIPT - Certified Information Privacy Technologist
WHAT YOU'LL LEARN
• Critical privacy concepts and practices that impact IT
• Consumer privacy expectations and responsibility
• How to bake privacy into early stages of IT products and services for
cost control, accuracy and speed-to-market
• How to establish privacy practices for data collection and transfer
• How to preempt privacy issues in the Internet of Things
• How to factor privacy into data classification and emerging tech such
as cloud computing, facial recognition and surveillance
• How to communicate privacy issues with partners such as
management, development, marketing and legal.
13
I. Understanding the need for privacy in the IT
environment
A. Evolving Compliance Requirements
B. Major risks to a company’s IT framework
C. Stakeholder expectations for Privacy
D. Privacy vs. Security
II. Core Privacy Concepts
A. Foundational Elements for Embedding Privacy in IT
B. Common Privacy Principles
III. Privacy Considerations in the Information Life Cycle
A. Disclosure
B. Collection
C. Use
D. Retention
E. Destruction
IV. Privacy in Systems and Applications
A. The Enterprise IT Environment--Common Challenges
B. Identity and Access Management
C. Credit Card Information and Processing
D. Remote Access, Telecommuting, and Bringing Devices
to Work
E. Data Encryption
F. Other Privacy-Enhancing Technologies
G. Customer-Facing Applications
V. Privacy Techniques
A. Authentication Techniques
B. Identifiability
C. Data Protection by Design
VI. Online Privacy Issues
A. Specific Requirements for the Online
Environment
B. Social Media
C. Online Threats
D. Online Advertising
E. Tracking Technologies
F. Web Browser Privacy and Security
G. Web Security Protocols
VII. Technologies with Privacy
Considerations
A. Cloud Computing
B. Wireless IDs
C. Location-based Services
D. Smart Technologies
E. Video/data/audio
surveillance
F. Biometrics
14
IAPP Store: Exam Prep
Sample Questions (electronic version) – 25 $/35 $
GDPR Prep Online Bundle (CIPM) – 1495 $
• Privacy Program Management Online Training (The training
comprises 10 modules, which take a total of approximately 10 hours
to complete (one hour per module).)
• CIPM Certification Exam
• Sample Questions
• Privacy Program Management: Tools for Managing Privacy Within
Your Organization (Electronic Copy)
• 1 year Complimentary IAPP Membership
Privacy Program Management Online Training – 995 $ / 1195 $
15
Free resources
• 2018 Certification Candidate Handbook -
https://iapp.org/media/pdf/certification/IAPP-Privacy-Certification-
Candidate-Handbook3.1.0.pdf
• Glossary of Privacy Terms - https://iapp.org/resources/glossary
16

More Related Content

What's hot

Srimad Bhagavad Gita, AS IT IS, Chapter 3, Presentation Notes
Srimad Bhagavad Gita, AS IT IS, Chapter 3, Presentation NotesSrimad Bhagavad Gita, AS IT IS, Chapter 3, Presentation Notes
Srimad Bhagavad Gita, AS IT IS, Chapter 3, Presentation NotesAmritananda Das
 
BHAGVAD GITA CHAPTER 9 FLOWCHARTS
BHAGVAD GITA CHAPTER 9 FLOWCHARTSBHAGVAD GITA CHAPTER 9 FLOWCHARTS
BHAGVAD GITA CHAPTER 9 FLOWCHARTSMedicherla Kumar
 
BHAGVAD GITA ,Chapter 2, Verses 7-10
BHAGVAD GITA ,Chapter 2, Verses 7-10BHAGVAD GITA ,Chapter 2, Verses 7-10
BHAGVAD GITA ,Chapter 2, Verses 7-10Medicherla Kumar
 
Srila Prabhupada On Bhakti Sastri
Srila Prabhupada On Bhakti SastriSrila Prabhupada On Bhakti Sastri
Srila Prabhupada On Bhakti SastriMayapur Institute
 
Q radar architecture deep dive
Q radar architecture   deep diveQ radar architecture   deep dive
Q radar architecture deep diveKamal Mouline
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2newbie2019
 
Introduction to Bhagavad-Gita: As It Is
Introduction to Bhagavad-Gita: As It IsIntroduction to Bhagavad-Gita: As It Is
Introduction to Bhagavad-Gita: As It IsYahshua Hosch
 
The Essence Of Bhagwat Gita
The Essence Of Bhagwat GitaThe Essence Of Bhagwat Gita
The Essence Of Bhagwat Gitasuhas deshpande
 
Bhagvad Gita chapter 12 , Flowcharts and Overview
Bhagvad Gita chapter 12 , Flowcharts and Overview Bhagvad Gita chapter 12 , Flowcharts and Overview
Bhagvad Gita chapter 12 , Flowcharts and Overview Medicherla Kumar
 
Bhagvad Gita Chapter 7 (Revised 2021),Jnana-Vijnana Yoga (The yoga of knowled...
Bhagvad Gita Chapter 7 (Revised 2021),Jnana-Vijnana Yoga (The yoga of knowled...Bhagvad Gita Chapter 7 (Revised 2021),Jnana-Vijnana Yoga (The yoga of knowled...
Bhagvad Gita Chapter 7 (Revised 2021),Jnana-Vijnana Yoga (The yoga of knowled...Medicherla Kumar
 
[Wroclaw #3] Trusted Computing
[Wroclaw #3] Trusted Computing[Wroclaw #3] Trusted Computing
[Wroclaw #3] Trusted ComputingOWASP
 
Bhagvad Gita chapter 1( (Revised 2021) ,Arjuna-Vishada yoga ,Flow charts
Bhagvad Gita chapter 1( (Revised 2021) ,Arjuna-Vishada yoga ,Flow chartsBhagvad Gita chapter 1( (Revised 2021) ,Arjuna-Vishada yoga ,Flow charts
Bhagvad Gita chapter 1( (Revised 2021) ,Arjuna-Vishada yoga ,Flow chartsMedicherla Kumar
 
BHAGVAD GITA Chapter 1, Verse 1
BHAGVAD GITA Chapter 1, Verse 1BHAGVAD GITA Chapter 1, Verse 1
BHAGVAD GITA Chapter 1, Verse 1Medicherla Kumar
 
Bhagvad Gita chapter 9 ,(revised 2021) , Raja-Vidya-Raja-Guhya Yoga (The yoga...
Bhagvad Gita chapter 9 ,(revised 2021) , Raja-Vidya-Raja-Guhya Yoga (The yoga...Bhagvad Gita chapter 9 ,(revised 2021) , Raja-Vidya-Raja-Guhya Yoga (The yoga...
Bhagvad Gita chapter 9 ,(revised 2021) , Raja-Vidya-Raja-Guhya Yoga (The yoga...Medicherla Kumar
 
Bhagavad Gita Chapter 01
Bhagavad Gita Chapter 01Bhagavad Gita Chapter 01
Bhagavad Gita Chapter 01Amritananda Das
 
BHAGVAD GITA CHAPTER 15 FLOWCHARTS AND OVERVIEW
BHAGVAD GITA CHAPTER 15 FLOWCHARTS AND OVERVIEW BHAGVAD GITA CHAPTER 15 FLOWCHARTS AND OVERVIEW
BHAGVAD GITA CHAPTER 15 FLOWCHARTS AND OVERVIEW Medicherla Kumar
 
Upadesamrita (Text 1)
Upadesamrita (Text 1)Upadesamrita (Text 1)
Upadesamrita (Text 1)Yahshua Hosch
 
Srimad Bhagavad Gita, AS IT IS, Chapter 5, Presentation Notes
Srimad Bhagavad Gita, AS IT IS, Chapter 5, Presentation NotesSrimad Bhagavad Gita, AS IT IS, Chapter 5, Presentation Notes
Srimad Bhagavad Gita, AS IT IS, Chapter 5, Presentation NotesAmritananda Das
 

What's hot (20)

Srimad Bhagavad Gita, AS IT IS, Chapter 3, Presentation Notes
Srimad Bhagavad Gita, AS IT IS, Chapter 3, Presentation NotesSrimad Bhagavad Gita, AS IT IS, Chapter 3, Presentation Notes
Srimad Bhagavad Gita, AS IT IS, Chapter 3, Presentation Notes
 
BHAGVAD GITA CHAPTER 9 FLOWCHARTS
BHAGVAD GITA CHAPTER 9 FLOWCHARTSBHAGVAD GITA CHAPTER 9 FLOWCHARTS
BHAGVAD GITA CHAPTER 9 FLOWCHARTS
 
Bhagvad Gita PPT
Bhagvad Gita PPTBhagvad Gita PPT
Bhagvad Gita PPT
 
BHAGVAD GITA ,Chapter 2, Verses 7-10
BHAGVAD GITA ,Chapter 2, Verses 7-10BHAGVAD GITA ,Chapter 2, Verses 7-10
BHAGVAD GITA ,Chapter 2, Verses 7-10
 
Srila Prabhupada On Bhakti Sastri
Srila Prabhupada On Bhakti SastriSrila Prabhupada On Bhakti Sastri
Srila Prabhupada On Bhakti Sastri
 
Q radar architecture deep dive
Q radar architecture   deep diveQ radar architecture   deep dive
Q radar architecture deep dive
 
Basel norms
Basel normsBasel norms
Basel norms
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Introduction to Bhagavad-Gita: As It Is
Introduction to Bhagavad-Gita: As It IsIntroduction to Bhagavad-Gita: As It Is
Introduction to Bhagavad-Gita: As It Is
 
The Essence Of Bhagwat Gita
The Essence Of Bhagwat GitaThe Essence Of Bhagwat Gita
The Essence Of Bhagwat Gita
 
Bhagvad Gita chapter 12 , Flowcharts and Overview
Bhagvad Gita chapter 12 , Flowcharts and Overview Bhagvad Gita chapter 12 , Flowcharts and Overview
Bhagvad Gita chapter 12 , Flowcharts and Overview
 
Bhagvad Gita Chapter 7 (Revised 2021),Jnana-Vijnana Yoga (The yoga of knowled...
Bhagvad Gita Chapter 7 (Revised 2021),Jnana-Vijnana Yoga (The yoga of knowled...Bhagvad Gita Chapter 7 (Revised 2021),Jnana-Vijnana Yoga (The yoga of knowled...
Bhagvad Gita Chapter 7 (Revised 2021),Jnana-Vijnana Yoga (The yoga of knowled...
 
[Wroclaw #3] Trusted Computing
[Wroclaw #3] Trusted Computing[Wroclaw #3] Trusted Computing
[Wroclaw #3] Trusted Computing
 
Bhagvad Gita chapter 1( (Revised 2021) ,Arjuna-Vishada yoga ,Flow charts
Bhagvad Gita chapter 1( (Revised 2021) ,Arjuna-Vishada yoga ,Flow chartsBhagvad Gita chapter 1( (Revised 2021) ,Arjuna-Vishada yoga ,Flow charts
Bhagvad Gita chapter 1( (Revised 2021) ,Arjuna-Vishada yoga ,Flow charts
 
BHAGVAD GITA Chapter 1, Verse 1
BHAGVAD GITA Chapter 1, Verse 1BHAGVAD GITA Chapter 1, Verse 1
BHAGVAD GITA Chapter 1, Verse 1
 
Bhagvad Gita chapter 9 ,(revised 2021) , Raja-Vidya-Raja-Guhya Yoga (The yoga...
Bhagvad Gita chapter 9 ,(revised 2021) , Raja-Vidya-Raja-Guhya Yoga (The yoga...Bhagvad Gita chapter 9 ,(revised 2021) , Raja-Vidya-Raja-Guhya Yoga (The yoga...
Bhagvad Gita chapter 9 ,(revised 2021) , Raja-Vidya-Raja-Guhya Yoga (The yoga...
 
Bhagavad Gita Chapter 01
Bhagavad Gita Chapter 01Bhagavad Gita Chapter 01
Bhagavad Gita Chapter 01
 
BHAGVAD GITA CHAPTER 15 FLOWCHARTS AND OVERVIEW
BHAGVAD GITA CHAPTER 15 FLOWCHARTS AND OVERVIEW BHAGVAD GITA CHAPTER 15 FLOWCHARTS AND OVERVIEW
BHAGVAD GITA CHAPTER 15 FLOWCHARTS AND OVERVIEW
 
Upadesamrita (Text 1)
Upadesamrita (Text 1)Upadesamrita (Text 1)
Upadesamrita (Text 1)
 
Srimad Bhagavad Gita, AS IT IS, Chapter 5, Presentation Notes
Srimad Bhagavad Gita, AS IT IS, Chapter 5, Presentation NotesSrimad Bhagavad Gita, AS IT IS, Chapter 5, Presentation Notes
Srimad Bhagavad Gita, AS IT IS, Chapter 5, Presentation Notes
 

Similar to IAPP certification programs overview

2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliantTrustArc
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationJim Kaplan CIA CFE
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...AIIM International
 
Privacy Frameworks: The Foundation for Every Privacy Program
Privacy Frameworks: The Foundation for Every Privacy ProgramPrivacy Frameworks: The Foundation for Every Privacy Program
Privacy Frameworks: The Foundation for Every Privacy ProgramTrustArc
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyFLUZO
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 Jim Kaplan CIA CFE
 
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsCCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsTrustArc
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerCapgemini
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesDimitri Sirota
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Jim Kaplan CIA CFE
 
Legal Issues For Online Communities - David Deakin
Legal Issues For Online Communities - David DeakinLegal Issues For Online Communities - David Deakin
Legal Issues For Online Communities - David DeakinFeverBee Limited
 
Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19Vinod Kashyap
 
EUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIPEUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIPScott Baron
 
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital MarketersOne North
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceCobweb
 
Whos role is it anyway
Whos role is it anywayWhos role is it anyway
Whos role is it anywayIRIS
 
5 Ways an IAPP Privacy Certification Can Boost Your Career
5 Ways an IAPP Privacy Certification Can Boost Your Career5 Ways an IAPP Privacy Certification Can Boost Your Career
5 Ways an IAPP Privacy Certification Can Boost Your CareerInfosec
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy ProgramDaniel Ayala
 

Similar to IAPP certification programs overview (20)

2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
Privacy Frameworks: The Foundation for Every Privacy Program
Privacy Frameworks: The Foundation for Every Privacy ProgramPrivacy Frameworks: The Foundation for Every Privacy Program
Privacy Frameworks: The Foundation for Every Privacy Program
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to Privacy
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6
 
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsCCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
 
GDPR Series Session 4
GDPR Series Session 4GDPR Series Session 4
GDPR Series Session 4
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
Legal Issues For Online Communities - David Deakin
Legal Issues For Online Communities - David DeakinLegal Issues For Online Communities - David Deakin
Legal Issues For Online Communities - David Deakin
 
Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19
 
EUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIPEUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIP
 
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to Compliance
 
Whos role is it anyway
Whos role is it anywayWhos role is it anyway
Whos role is it anyway
 
5 Ways an IAPP Privacy Certification Can Boost Your Career
5 Ways an IAPP Privacy Certification Can Boost Your Career5 Ways an IAPP Privacy Certification Can Boost Your Career
5 Ways an IAPP Privacy Certification Can Boost Your Career
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 

More from Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001

More from Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001 (20)

NIST Cybersecurity Framework (CSF) 2.0: What has changed?
NIST Cybersecurity Framework (CSF) 2.0: What has changed?NIST Cybersecurity Framework (CSF) 2.0: What has changed?
NIST Cybersecurity Framework (CSF) 2.0: What has changed?
 
pr ISMS Documented Information (lite).pdf
pr ISMS Documented Information (lite).pdfpr ISMS Documented Information (lite).pdf
pr ISMS Documented Information (lite).pdf
 
ISO Survey 2022: ISO 27001 certificates (ISMS)
ISO Survey 2022: ISO 27001 certificates (ISMS)ISO Survey 2022: ISO 27001 certificates (ISMS)
ISO Survey 2022: ISO 27001 certificates (ISMS)
 
12 Best Privacy Frameworks
12 Best Privacy Frameworks12 Best Privacy Frameworks
12 Best Privacy Frameworks
 
Cybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdfCybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdf
 
My 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
My 15 Years of Experience in Using Mind Maps for Business and Personal PurposesMy 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
My 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
 
From NIST CSF 1.1 to 2.0.pdf
From NIST CSF 1.1 to 2.0.pdfFrom NIST CSF 1.1 to 2.0.pdf
From NIST CSF 1.1 to 2.0.pdf
 
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
ISO 27001 How to use the ISMS Implementation Toolkit.pdfISO 27001 How to use the ISMS Implementation Toolkit.pdf
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
 
ISO 27001 How to accelerate the implementation.pdf
ISO 27001 How to accelerate the implementation.pdfISO 27001 How to accelerate the implementation.pdf
ISO 27001 How to accelerate the implementation.pdf
 
How to use ChatGPT for an ISMS implementation.pdf
How to use ChatGPT for an ISMS implementation.pdfHow to use ChatGPT for an ISMS implementation.pdf
How to use ChatGPT for an ISMS implementation.pdf
 
pr Privacy Principles 230405 small.pdf
pr Privacy Principles 230405 small.pdfpr Privacy Principles 230405 small.pdf
pr Privacy Principles 230405 small.pdf
 
ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO 27001:2022 Introduction
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
 
ISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdfISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdf
 
ISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdfISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdf
 
ISO Survey 2021: ISO 27001.pdf
ISO Survey 2021: ISO 27001.pdfISO Survey 2021: ISO 27001.pdf
ISO Survey 2021: ISO 27001.pdf
 
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdfAll about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
 
Supply management 1.1.pdf
Supply management 1.1.pdfSupply management 1.1.pdf
Supply management 1.1.pdf
 
Employee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdfEmployee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdf
 
GDPR RACI.pdf
GDPR RACI.pdfGDPR RACI.pdf
GDPR RACI.pdf
 

Recently uploaded

The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...James Watkins, III JD CFP®
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...Finlaw Associates
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnitymahikaanand16
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理A AA
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.pptseri bangash
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理Airst S
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteDeepikaK245113
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxRRR Chambers
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理bd2c5966a56d
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringSteering Law
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxadvabhayjha2627
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersJillianAsdala
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategyJong Hyuk Choi
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)Delhi Call girls
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理Airst S
 
Clarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo forClarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo forRoger Valdez
 

Recently uploaded (20)

The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. Steering
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
Clarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo forClarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo for
 

IAPP certification programs overview

  • 2. About IAPP • https://iapp.org • The International Association of Privacy Professionals (IAPP) is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. • Founded in 2000 2
  • 3. Type and cost: • Professional – 275$ • Student – 50$ • Non-For-Profit / Retired / Government / Higher Education – 100$ 3
  • 4. IAPP Certification Programs • Asia (CIPP/A) • Canada (CIPP/C) • Europe (CIPP/E) • U.S. private-sector (CIPP/US) • Government (CIPP/G) CIPP/E + CIMP = GDPR Ready Bundle 4
  • 5. 5 The CIPP shows that you understand the laws, regulations and standards of privacy in your jurisdiction or discipline. The CIPP is for you if you’re responsible for: • Legal • Compliance • Information management • Data governance • Human Resources The CIPM says that you understand how to use process and technology to manage privacy in an organization—regardless of the industry or jurisdiction. The CIPM is for you if you’re responsible for: • Risk management • Privacy operations • Accountability • Audit • Privacy analytics The CIPT shows that you know how to manage and build privacy requirements and controls into technology. The CIPT is for you if you’re responsible for: • Information technology • Information security • Software engineering • Privacy by Design
  • 6. Price and Questions The IAPP’s CIPP/E, CIPP/US, CIPM and CIPT credentials are accredited by the American National Standards Institute (ANSI) under the International Organization for Standardization (ISO) standard 17024:2012. 6
  • 7. About testing • The IAPP offers two distinct testing modes—event-based paper-pencil testing at our major conferences and test center computer-based testing. Exam content is identical regardless of mode. Computer-based exams can be purchased at any time through the IAPP Store. Event paper-pencil exams can only be purchased through the registration process of the conference with a fixed testing date and time and do not need to be scheduled. • All IAPP examinations are administered in English. In addition, the CIPP/E exam is available in French and German. • Certification is a two-year term starting the day a candidate passes their exam. During this term, certificants are expected to maintain certification by submitting Continuing Privacy Education credits (CPE’s) - https://iapp.org/certify/cpe-policy (min 20 credit hours of CPE) 7
  • 8. Code of Professional Conduct (IAPP) All IAPP certified individuals must agree to comply with the Certificant Code of Professional Conduct as outlined below. Accordingly, by signing below you hereby represent, warrant and covenant to the IAPP as follows: • You will at all times conduct your business and/or professional activities with courtesy, honesty and integrity. • You will at all times represent your IAPP related certifications and qualifications honestly and agree to only undertake those activities that you can reasonably expect to complete with the necessary skills, knowledge and competence. • You will not represent any IAPP certification in a misleading way or use an IAPP certification in a manner that would bring the IAPP disrepute. • You will strive to maintain and improve your professional knowledge and competence through regular self-assessments and continuing education or training. • You will follow all certification policies, procedures, guidelines and requirements of the IAPP that are made available to you by the IAPP, as the same may be amended from time to time. 8
  • 9. CIPP/E - Certified Information Privacy Professional Developed in collaboration with the law firms, Bird and Bird, Field Fisher, Wilson/Sonsini and Covington and Burling, the CIPP/E encompasses pan-European and national data protection laws, key privacy terminology and practical concepts concerning the protection of personal data and trans-border data flows. WHAT YOU'LL LEARN • Introduction to European Data Protection • European Regulatory Institutions • Legislative Framework • Compliance with European Data Protection Law and Regulation • International Data Transfers 9
  • 10. I. Introduction to European Data Protection A. Origins and Historical Context of Data Protection Law B. European Union Institutions C. Legislative Framework III.Compliance with European Data Protection Law and Regulation A. Employment Relationship B. Surveillance Activities C. Direct Marketing D. Internet Technology and Communications II. European Data Protection Law and Regulation A. Data Protection Concepts B. Territorial and Material Scope of the General Data Protection Regulation C. Data Processing Principles D. Lawful Processing Criteria E. Information Provision Obligations F. Data Subjects’ Rights G. Security of Personal Data H. Accountability Requirements I. International Data Transfers J. Supervision and enforcement K. Consequences for GDPR violations CIPP/E Domains 10
  • 11. CIPM - Certified Information Privacy Manager The CIPM is the world’s first and only certification in privacy program management. When you earn a CIPM, it shows that you don’t just know privacy regulations—you know how to make it work for your organization. In other words, you’re the go-to person for day-to-day operations when it comes to privacy. WHAT YOU'LL LEARN • How to create a company vision • How to structure the privacy team • How to develop and implement a privacy program framework • How to communicate to stakeholders • How to measure performance • The privacy program operational lifecycle 11
  • 12. I. Privacy Program Governance A. Organization Level • a. Create a company vision • b. Establish a privacy program • c. Structure the privacy team B. Develop the Privacy Program Framework • a. Develop organizational privacy policies, standards and/or guidelines • b. Define privacy program activities C. Implement the Privacy Policy Framework • a. Communicate the framework to internal and external stakeholders • b. Ensure continuous alignment to applicable laws and regulations to support the • development of an organizational privacy program framework D. Metrics • a. Identify intended audience for metrics • b. Define reporting resources • c. Define privacy metrics for oversight and governance per audience • d. Identify systems/application collection points II. Privacy Operational Life Cycle A. Assess Your Organization • a. Document current baseline of your privacy program • b. Processors and third-party vendor assessment • c. Physical assessments • d. Mergers, acquisitions and divestitures • e. Conduct analysis and assessments, as needed or appropriate B. Protect • a. Data life cycle (creation to deletion) • b. Information security practices • c. Privacy by Design C. Sustain • a. Measure • b. Align • c. Audit • d. Communicate • e. Monitor D. Respond • a. Information requests • b. Privacy incidents 12
  • 13. CIPT - Certified Information Privacy Technologist WHAT YOU'LL LEARN • Critical privacy concepts and practices that impact IT • Consumer privacy expectations and responsibility • How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market • How to establish privacy practices for data collection and transfer • How to preempt privacy issues in the Internet of Things • How to factor privacy into data classification and emerging tech such as cloud computing, facial recognition and surveillance • How to communicate privacy issues with partners such as management, development, marketing and legal. 13
  • 14. I. Understanding the need for privacy in the IT environment A. Evolving Compliance Requirements B. Major risks to a company’s IT framework C. Stakeholder expectations for Privacy D. Privacy vs. Security II. Core Privacy Concepts A. Foundational Elements for Embedding Privacy in IT B. Common Privacy Principles III. Privacy Considerations in the Information Life Cycle A. Disclosure B. Collection C. Use D. Retention E. Destruction IV. Privacy in Systems and Applications A. The Enterprise IT Environment--Common Challenges B. Identity and Access Management C. Credit Card Information and Processing D. Remote Access, Telecommuting, and Bringing Devices to Work E. Data Encryption F. Other Privacy-Enhancing Technologies G. Customer-Facing Applications V. Privacy Techniques A. Authentication Techniques B. Identifiability C. Data Protection by Design VI. Online Privacy Issues A. Specific Requirements for the Online Environment B. Social Media C. Online Threats D. Online Advertising E. Tracking Technologies F. Web Browser Privacy and Security G. Web Security Protocols VII. Technologies with Privacy Considerations A. Cloud Computing B. Wireless IDs C. Location-based Services D. Smart Technologies E. Video/data/audio surveillance F. Biometrics 14
  • 15. IAPP Store: Exam Prep Sample Questions (electronic version) – 25 $/35 $ GDPR Prep Online Bundle (CIPM) – 1495 $ • Privacy Program Management Online Training (The training comprises 10 modules, which take a total of approximately 10 hours to complete (one hour per module).) • CIPM Certification Exam • Sample Questions • Privacy Program Management: Tools for Managing Privacy Within Your Organization (Electronic Copy) • 1 year Complimentary IAPP Membership Privacy Program Management Online Training – 995 $ / 1195 $ 15
  • 16. Free resources • 2018 Certification Candidate Handbook - https://iapp.org/media/pdf/certification/IAPP-Privacy-Certification- Candidate-Handbook3.1.0.pdf • Glossary of Privacy Terms - https://iapp.org/resources/glossary 16