Description
About this Course
Every day, organisations are building, developing, engineering and managing systems and processes that involve personal data. We can achieve great benefits automating at scale with new technologies, but also great potential harms to individuals at the same scale. Unless we have a solid understanding of these technologies, the harms they could potentially cause and the potential controls we could introduce to prevent them, the organisation is risking a data breach, diminished customer trust and possible regulatory and legal enforcement action.
What's more, it doesn't have to be "Privacy vs Functionality" - a dated zero sum approach - by adopting a proactive approach and adding functionality at the requirements stage, we can truly have it all - a "win-win" positive sum of harnessing the business benefit and innovation whilst protecting people and giving them control over their information.
This Privacy in Technology course leading to the official IAPP ANSI/ISO-accredited CIPT certification, is the how-to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. We'll provide you and your team with the knowledge needed to help meet your privacy program goals of reduced risk, improved compliance, enhanced brand loyalty and more.
Benefits for the professional.
The CIPT credential shows you’ve got the knowledge to build your organization’s data protection structures from the ground up. Become the person your team and organization rely on for solutions that minimize the impact of breaches, regulatory penalties and lost customer trust.
- Be recognized as a leading professional in information security.
- Gain the confidence to interpret privacy regulations and ensure best practice techniques are embedded into your IT infrastructure.
- Greater ability to identify potential impacts of privacy on IT products and services at the beginning of their lifecycle.
Benefits for the organization.
Companies that employ professionals with CIPT certifications are better able to apply strategies, policies, processes and techniques to manage cybersecurity risks while enabling prudent data use for business purposes.
- Build privacy-friendly products, services and processes by embedding data protection throughout every stage of development.
- Recognize benefits and challenges of emerging technologies and how to use them while respecting customer privacy.
- Protect data from various forms of interference.
- Design software and systems to better ensure privacy.
- Establish privacy practices for data security and control, such as minimization, limited access and encryption.
- Audit infrastructure and communicate privacy issues with management, development, marketing and legal departments, and collaborate with them to produce solutions.
Who Should Attend
This course is designed for individuals whose work relates to the processing of personal data, including:
- Privacy Professionals
- Product Managers
- Cybersecurity Professionals
- Data Scientists/Analysts/Architects
- IT Managers/Administrators
- System Administrators/Developers
- Software Developers
- UX Designers
- Anyone who works in Technology Acquisition, Risk Management & Compliance
Course Outline
The curriculum includes privacy-by-design principles; implementing data- and process-oriented strategies to support privacy policies; and managing threats from AI, location tracking, etc.
Summarizes the foundational elements for embedding privacy in technology through privacy by design and value-sensitive design; reviews the data life cycle and common privacy risk models and frameworks.
Reviews the fundamentals of privacy as they relate to the privacy technologist; describes the privacy technologist’s role in ensuring compliance with privacy requirements and meeting stakeholder privacy expectations; explores the relationship between privacy and security.
Identifies inherent risks throughout the stages of the data life cycle and explores how software security helps mitigate privacy threats; examines the impacts that behavioral advertising, cyberbullying and social engineering have on privacy within the technological environment.
Outlines the strategies and techniques for enhancing privacy throughout the data life cycle, including: identity and access management; authentication, encryption, and aggregation; collection and use of personal information.
Explores the role of privacy engineering within an organization, including the objectives of privacy engineering, privacy design patterns, and software privacy risks.
Illustrates the process and methodology of the privacy-by-design model; explores practices to ensure ongoing vigilance when implementing privacy by design.
Examines the unique challenges that come from online privacy issues, including automated decision making, tracking and surveillance technologies, anthropomorphism, ubiquitous computing and mobile social computing.
Educators
The selected international practitioners, leading industry experts in areas including IT, Legal, Compliance, Security and Privacy, will each deliver various modules reflecting their various areas of expertise. Apart from being accredited IAPP (International Association of Privacy Professionals) educators, the selected practitioners have years of experience positioning them as key leaders in this field.
Certification
The IAPP offers the most encompassing, up-to-date, recognised and sought-after global privacy certifications which are accredited by ANSI/ISO and some of the world's top international brands. Upon completion of the Privacy in Technology course, students are encouraged to sit for the IAPP Certified Information Privacy Technologist exam within a maximum timeframe of 12 months.
The CIPT exam is 150 minutes long (2.5 Hours) and consist of 90 multiple-choice questions. The passing score is 300 out of 500. Should a candidate fail their first exam attempt, they would be able to re-take the exam within 30 days. The exam is delivered on the international Pearson VUE Testing System and the result is made available straight after the exam session. Upon successful completion, students receive a digital copy of the certificate by email within 3 weeks. |
Course Details
MODE OF STUDY
Bootcamp - Online Live
DELIVERY METHOD
Interactive Sessions & Case Studies
ENTRY REQUIREMENTS
- Good Knowledge of English
ONLINE CLASS REQUIREMENTS
Mac or Windows PC
WebCam & Microphone
Stable Internet Connection
SCHEDULE
Day #1: Thursday 18th April 2024
Day #2: Friday 19th April 2024
DURATION
2 Days (Bootcamp)
DAY(S)
Thursday & Friday
TIME
9.00AM till 4.00PM
STARTING DATE
Thursday 18th April 2024
END DATE
Friday 19th April 2024
WHAT'S INCLUDED
- Training by an Official IAPP Certified Educator
- Official IAPP CIPT Participant Guide
- Official IAPP CIPT Textbook
- Official IAPP CIPT Practice Test
- Official IAPP CIPT Certification Exam Voucher
- 6-Months Post-Course Educator Email Support
- 30-Day Lesson Playback (Rewatch On-Demand) NEW
- One-Year IAPP Membership (Access to Community & Members-only Content)
Price: € 1495
Every day, organisations are building, developing, engineering and managing systems and processes that involve personal data. We can achieve great benefits automating at scale with new technologies, but also great potential harms to individuals at the same scale. Unless we have a solid understanding of these technologies, the harms they could potentially cause and the potential controls we could introduce to prevent them, the organisation is risking a data breach, diminished customer trust and possible regulatory and legal enforcement action.
What's more, it doesn't have to be "Privacy vs Functionality" - a dated zero sum approach - by adopting a proactive approach and adding functionality at the requirements stage, we can truly have it all - a "win-win" positive sum of harnessing the business benefit and innovation whilst protecting people and giving them control over their information.
This Privacy in Technology course leading to the official IAPP ANSI/ISO-accredited CIPT certification, is the how-to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. We'll provide you and your team with the knowledge needed to help meet your privacy program goals of reduced risk, improved compliance, enhanced brand loyalty and more.
Benefits for the professional.
The CIPT credential shows you’ve got the knowledge to build your organization’s data protection structures from the ground up. Become the person your team and organization rely on for solutions that minimize the impact of breaches, regulatory penalties and lost customer trust.
- Be recognized as a leading professional in information security.
- Gain the confidence to interpret privacy regulations and ensure best practice techniques are embedded into your IT infrastructure.
- Greater ability to identify potential impacts of privacy on IT products and services at the beginning of their lifecycle.
Benefits for the organization.
Companies that employ professionals with CIPT certifications are better able to apply strategies, policies, processes and techniques to manage cybersecurity risks while enabling prudent data use for business purposes.
- Build privacy-friendly products, services and processes by embedding data protection throughout every stage of development.
- Recognize benefits and challenges of emerging technologies and how to use them while respecting customer privacy.
- Protect data from various forms of interference.
- Design software and systems to better ensure privacy.
- Establish privacy practices for data security and control, such as minimization, limited access and encryption.
- Audit infrastructure and communicate privacy issues with management, development, marketing and legal departments, and collaborate with them to produce solutions.
Who Should Attend
This course is designed for individuals whose work relates to the processing of personal data, including:
- Privacy Professionals
- Product Managers
- Cybersecurity Professionals
- Data Scientists/Analysts/Architects
- IT Managers/Administrators
- System Administrators/Developers
- Software Developers
- UX Designers
- Anyone who works in Technology Acquisition, Risk Management & Compliance
The curriculum includes privacy-by-design principles; implementing data- and process-oriented strategies to support privacy policies; and managing threats from AI, location tracking, etc.
Summarizes the foundational elements for embedding privacy in technology through privacy by design and value-sensitive design; reviews the data life cycle and common privacy risk models and frameworks.
Reviews the fundamentals of privacy as they relate to the privacy technologist; describes the privacy technologist’s role in ensuring compliance with privacy requirements and meeting stakeholder privacy expectations; explores the relationship between privacy and security.
Identifies inherent risks throughout the stages of the data life cycle and explores how software security helps mitigate privacy threats; examines the impacts that behavioral advertising, cyberbullying and social engineering have on privacy within the technological environment.
Outlines the strategies and techniques for enhancing privacy throughout the data life cycle, including: identity and access management; authentication, encryption, and aggregation; collection and use of personal information.
Explores the role of privacy engineering within an organization, including the objectives of privacy engineering, privacy design patterns, and software privacy risks.
Illustrates the process and methodology of the privacy-by-design model; explores practices to ensure ongoing vigilance when implementing privacy by design.
Examines the unique challenges that come from online privacy issues, including automated decision making, tracking and surveillance technologies, anthropomorphism, ubiquitous computing and mobile social computing.
The selected international practitioners, leading industry experts in areas including IT, Legal, Compliance, Security and Privacy, will each deliver various modules reflecting their various areas of expertise. Apart from being accredited IAPP (International Association of Privacy Professionals) educators, the selected practitioners have years of experience positioning them as key leaders in this field.
The IAPP offers the most encompassing, up-to-date, recognised and sought-after global privacy certifications which are accredited by ANSI/ISO and some of the world's top international brands. Upon completion of the Privacy in Technology course, students are encouraged to sit for the IAPP Certified Information Privacy Technologist exam within a maximum timeframe of 12 months.
The CIPT exam is 150 minutes long (2.5 Hours) and consist of 90 multiple-choice questions. The passing score is 300 out of 500. Should a candidate fail their first exam attempt, they would be able to re-take the exam within 30 days. The exam is delivered on the international Pearson VUE Testing System and the result is made available straight after the exam session. Upon successful completion, students receive a digital copy of the certificate by email within 3 weeks. |
MODE OF STUDY
Bootcamp - Online Live
DELIVERY METHOD
Interactive Sessions & Case Studies
ENTRY REQUIREMENTS
- Good Knowledge of English
ONLINE CLASS REQUIREMENTS
Mac or Windows PC
WebCam & Microphone
Stable Internet Connection
SCHEDULE
Day #1: Thursday 18th April 2024
Day #2: Friday 19th April 2024
DURATION
2 Days (Bootcamp)
DAY(S)
Thursday & Friday
TIME
9.00AM till 4.00PM
STARTING DATE
Thursday 18th April 2024
END DATE
Friday 19th April 2024
WHAT'S INCLUDED
- Training by an Official IAPP Certified Educator
- Official IAPP CIPT Participant Guide
- Official IAPP CIPT Textbook
- Official IAPP CIPT Practice Test
- Official IAPP CIPT Certification Exam Voucher
- 6-Months Post-Course Educator Email Support
- 30-Day Lesson Playback (Rewatch On-Demand) NEW
- One-Year IAPP Membership (Access to Community & Members-only Content)