Certified Information Privacy Manager (CIPM)

4.6 out of 5 rating

Jump to dates

Duration

2 Days

12 CPD hours

This course is intended for

Data Protection Officers
Data Protection Managers
Auditors
Legal Compliance Officers
Security Manager
Information Managers
Anyone involved with data protection processes and programmes

Overview

Principles of Privacy Program Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organization through process and technology?regardless of jurisdiction or industry.
The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Manager (CIPM) certification program.

Description

Founded in 2000, the IAPP is the world?s largest and most comprehensive privacy resource with a mission to define, support and improve the Privacy profession globally.
Every organization has data protection needs. Every day, we access, share and manage data across companies, continents and the globe. Knowing how to implement a privacy program is an invaluable skill that will help you protect your organization?s data?and take your career to the next level.

Our Principles of Privacy Program Management training is the premier course on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a privacy team.

Introduction to privacy program management
  • Privacy program management responsibilities
  • Accountability in privacy program management
Privacy governance
  • Considerations for developing and implementing a privacy program
  • Position of the privacy function within an organization
  • Role of the DPO
  • Program scope and charter
  • Privacy strategy
  • Support and ongoing involvement of key functions and privacy frameworks
Applicable laws and regulations
  • The regulatory environment
  • Common elements across jurisdictions
  • Strategies for aligning compliance with organizational strategy
Data assessments
  • Practical processes for creating and using data inventories/maps
  • Generating and applying gap analyses
  • Privacy assessments
  • Privacy impact assessments/data protection impact assessments
  • Vendor assessments
Policies
  • Common types of privacy-related policies
  • Policy components
  • Strategies for implementation
Data subject rights
  • Operational considerations for communicating and ensuring data subject rights
  • Privacy notice
  • Choice and consent
  • Access and rectification
  • Data portability
  • Erasure
Training and awareness
  • Developing privacy training and awareness programs
  • Implementing privacy training and awareness programs
Protecting personal information
  • Holistic approach to protecting personal information
  • Privacy by design
Data breach incident plans
  • Planning for a data security incident or breach
  • Responding to a data security incident or breach
Monitoring and auditing program performance
  • Common practices for monitoring privacy program performance
  • Measuring, analyzing and auditing privacy programs
Training Insurance Included!

When you organise training, we understand that there is a risk that some people may fall ill, become unavailable. To mitigate the risk we include training insurance for each delegate enrolled on our public schedule, they are welcome to sit on the same Public class within 6 months at no charge, if the case arises.

What people say about us


Find out more about this course

Interested in alternative dates? Would like to book a private session of this course for your company? Or for any other queries please simply fill out the form below.