CIPT from IAPP

£1,850.00 +VAT

Whether you work in the private or public sector, this 2 day course and CIPT credential will demonstrate you have the practical knowledge to apply privacy and data protection practices in the development, engineering, deployment or auditing of products and services.

Description

Module 1: Foundational principles of privacy in technology Summarizes the foundational elements for embedding privacy in technology through privacy by design and value sensitive design; reviews the data life cycle and common privacy risk models and frameworks
Module 2: The role of the technology professional in privacy Reviews the fundamentals of privacy as they relate to the privacy technologist; describes the privacy technologist’s role in ensuring compliance with privacy requirements and meeting stakeholder privacy expectations; explores the relationship between privacy and security
Module 3: Privacy threats and violations Identifies inherent risks throughout the stages of the data life cycle and explores how software security helps mitigate privacy threats; examines the impacts that behavioral advertising, cyberbullying and social engineering have on privacy within the technological environment
Module 4: Technical measures and privacy-enhancing technologies Outlines the strategies and techniques for enhancing privacy throughout the data life cycle, including: identity and access management; authentication, encryption, and aggregation; collection and use of personal information
Module 5: Privacy engineering Explores the role of privacy engineering within an organization, including the objectives of privacy engineering, privacy design patterns, and software privacy risks
Module 6: Privacy-by-design methodology Illustrates the process and methodology of the privacy-by-design model; explores practices to ensure ongoing vigilance when implementing privacy by design
Module 7: Technology challenges for privacy Examines the unique challenges that come from online privacy issues, including automated decision making, tracking and surveillance technologies, anthropomorphism, ubiquitous computing and mobile social computing

Reviews

There are no reviews yet.

Be the first to review “CIPT from IAPP”

Your email address will not be published. Required fields are marked *