CIPM Certification Training | Certified Information Privacy Manager Training

Print Friendly, PDF & Email
Introduction

CIPM Certification Training | Certified Information Privacy Manager Training course by Example – Learn the practices of managing information privacy while preparing for the CIPM examination.

In this CIPM Certification Training or Certified Information Privacy Manager Training course, you will gain foundational knowledge on concepts of privacy and data protection laws and practice. With Certified Information Privacy Manager Training or CIPM Certification Training, you will learn common principles and approaches to privacy as well as understand the major privacy models employed around the globe.

An introduction to information security concepts and information security management and governance will be covered including frameworks, controls, and identity and access management. You will also learn about online privacy as it relates to using personal information on websites and other internet-related technologies.

With CIPM Certification Training or Certified Information Privacy Manager Training, you will also learn how to create a privacy program at an organizational level, develop and implement a framework, and establish metrics to measure program effectiveness. In an interactive format applying practices to a real-world scenario, with CIPM Certification Training, you will review privacy program practices through the privacy life cycle: assess, protect, sustain and respond.

Duration: 2 days

CIPM Certification TrainingRelated Courses
 

CIPM Certification Training - Customize It:

» If you are familiar with some aspects of this CIPM Certification Training course, we can omit or shorten their discussion.
» We can adjust the emphasis placed on the various topics or build the CIPM Certification Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
» If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the CIPM Certification Training course in manner understandable to lay audiences.

CIPM Certification Training - Audience / Target Group:

The target audience for this CIPM Certification Training course:

» Individuals who need an understanding of practices in managing information privacy and data protection and those interested in pursuing CIPM certification

CIPM Certification Training – Objectives

Upon completing this CIPM Certification Training course, learners will be able to meet these objectives:

» Common Principles and Approaches to Privacy
» Jurisdiction and Industries
» Information Security: Safeguarding Personal Information
» Online Privacy: Using Personal Information Websites and with Other Internet-related Technologies
» Privacy Program Governance
» Privacy Operational Life Cycle

CIPM Certification Training – Course Syllabus

1. Fundamentals of Information Privacy

2. Common Principles and Approaches to Privacy

Modern History of Privacy
Types of Information
Risk Management Overview
Modern Privacy Principles

3. Jurisdictions and Industries

Major Privacy Models around the Globe
Privacy Regulation by Jurisdictions
Privacy Regulation by Industry Sectors

4. Information Security: Safeguarding Personal Information

Information Security
Definitions
Elements
Standards
Threats and Vulnerabilities
Information Security Management and Governance
Frameworks
Controls
Cryptography
Identity and Access Management (IAM)

5. Online Privacy: Using Personal Information and Websites and Other Internet-Related Technologies

Privacy Considerations for Sensitive Online Information
Notices
Access
Security
Authentication Identification
Data Collection
Additional Online Privacy
Children’s Online Privacy
Online Data Collection
Email
Searches
Online Marketing and Advertising
Social Media
Online Assurance
Cloud Computing
Mobile Devices

6. Privacy Program Governance

Create a Privacy Program
Company Vision
Alignment to the Business
Structure a Privacy Team
Develop and Implement a Framework
Organizational Privacy Policies
Standards and Guidelines
Establish Metrics to Measure Program Effectiveness
Define Program Activities
Define Program Metrics

7. Privacy Operational Life Cycle

Assess
Document Privacy Baseline
Data Processors and Third Party Vendor Assessments
Physical Assessments
Mergers, Acquisitions, and Divestures
Privacy Threshold Analysis
Privacy Impact Assessments
Information Security Practices
Protect
Privacy by Design
Integrating Privacy Requirements Across the Organization
Sustain
Auditing a Privacy Program
Creating Awareness
Compliance Monitoring
Respond
Handling Information Requests
Handling Privacy Incidents

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment

0