Price

1 695  € / 44 950 Kč

Duration

2 days

Delivery Methods

VILT / Private Group

The CIPM is the world’s first and only certification in privacy programme management. When a student earns a CIPM, it shows that you know how to make a privacy programme work for your organisation. In other words, you’re the go-to person for day-to-day operations when it comes to data protection.

The CIPM program was developed by the International Association of Privacy Professionals (IAPP), which is the world’s largest comprehensive global information privacy community and resource. The CIPM certification also holds accreditation under ISO 17024: 2012.

Principles of Privacy Program Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organization through process and technology—regardless of jurisdiction or industry.

Upcoming Class Dates and Times

Start Duration Location Language Delivery
7.12.2022 9:00 CET 2 days Prague, Czech Republic English VILT G2R
8.3.2023 9:00 CET 2 days Prague, Czech Republic English VILT

Who Should Attend

  • Data Protection Officers
  • Data Protection Managers
  • Auditors
  • Legal Compliance Officers
  • Security Manager
  • Information Managers
  • Anyone involved with data protection processes and programmes

Course Objectives

  1. Introduction to Privacy Program Management
    • Privacy program management responsibilities
    • Accountability in privacy program management
  2. Privacy Governance
    • Considerations for developing and implementing a privacy program
    • Position of the privacy function within an organization
    • Role of the DPO
    • Program scope and charter
    • Privacy strategy
    • Support and ongoing involvement of key functions and privacy frameworks
  3. Applicable Laws and Regulations
    • The regulatory environment
    • Common elements across jurisdictions
    • Strategies for aligning compliance with organizational strategy
  4. Data Assessments
    • Practical processes for creating and using data inventories/maps
    • Generating and applying gap analyses
    • Privacy assessments
    • Privacy impact assessments/data protection impact assessments
    • Vendor assessments
  5. Policies
    • Common types of privacy-related policies
    • Policy components
    • Strategies for implementation
  6. Data Subject Rights
    • Operational considerations for communicating and ensuring data subject rights
    • Privacy notice
    • Choice and consent
    • Access and rectification
    • Data portability
    • Erasure
  7. Training and Awareness
    • Developing privacy training and awareness programs
    • Implementing privacy training and awareness programs
  8. Protecting Personal Information
    • Holistic approach to protecting personal information
    • Privacy by design
  9. Data Breach Incident Plans
    • Planning for a data security incident or breach
    • Responding to a data security incident or breach
  10. Monitoring and Auditing Program Performance
    • Common practices for monitoring privacy program performance
    • Measuring, analyzing and auditing privacy programs
We use cookies
This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Cookie Policy.