SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Meet your privacy challenges
head on with IAPP TRAINING
Data Is One Of Your Most Valuable Assets
Every day it is being accessed, shared, managed and
transferred by people in your organization—in all
departments and at all levels. Unless your employees
have a solid understanding of the considerations
and challenges involved in managing data, you risk a
data breach, diminished customer trust and possible
enforcement action.
IAPP training can provide your staff with the
knowledge they need to help you meet your privacy
program goals of reduced risk, improved compliance,
enhanced brand loyalty and more. The IAPP offers
privacy and data protection training programs
specifically designed to extend that knowledge to
those on your team requiring a solid understanding
of privacy principles and practices.
In order to help you drive privacy knowledge across
your organization, our comprehensive and flexible
programs can be suited to your specific needs and
availability.
International Association of Privacy Professionals 				 				 iapp.org
061917
is the how-to training on implementing
a privacy program framework, managing
the privacy program operational lifecycle
and structuring a knowledgeable, high-
performing privacy team. Those taking
this course will learn the skills to manage
privacy in an organization through
process and technology—regardless of
jurisdiction or industry.
The Privacy Program Management
training is based on the body of
knowledge for the IAPP’s ANSI-accredited
Certified Information Privacy Manager
(CIPM) certification program.
By investing in your staff with this
globally recognized IAPP training,
you’ll give them the knowledge
to make better decisions in
their everyday work, which is
fundamental to the success of
your privacy program.
Privacy Program Management
PRIVACY PROGRAM MANAGEMENT
MODULES:
Module 1: Introduction to privacy program management
Identifies privacy program management responsibilities, and describes the role of accountability in privacy program
management.
Module 2: Privacy governance
Examines considerations for developing and implementing a privacy program, including the position of the privacy
function within the organization, role of the DPO, program scope and charter, privacy strategy, support and ongoing
involvement of key functions and privacy frameworks.
Module 3: Applicable laws and regulations
Discusses the regulatory environment, common elements across jurisdictions and strategies for aligning compliance
with organizational strategy.
Module 4: Data assessments
Relates practical processes for creating and using data inventories/maps, gap analyses, privacy assessments, privacy
impact assessments/data protection impact assessments and vendor assessments.
Module 5: Policies
Describes common types of privacy-related policies, outlines components and offers strategies for implementation.
Module 6: Data subject rights
Discusses operational considerations for communicating and ensuring data subject rights, including privacy notice,
choice and consent, access and rectification, data portability, and erasure and the right to be forgotten.
Module 7: Training and awareness
Outlines strategies for developing and implementing privacy training and awareness programs.
Module 8: Protecting personal information
Examines a holistic approach to protecting personal information through privacy by design.
Module 9: Data breach incident plans
Provides guidance on planning for and responding to a data security incident or breach.
Module 10: Measuring, monitoring and auditing program performance
Relates common practices for monitoring, measuring, analyzing and auditing privacy program performance.
International Association of Privacy Professionals 								 iapp.org
061917

Más contenido relacionado

Similar a CIPM

For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
alokkesh
 
GRADED SET 2Acute CareFor Skill Set 2, you must complete a.docx
GRADED SET 2Acute CareFor Skill Set 2, you must complete a.docxGRADED SET 2Acute CareFor Skill Set 2, you must complete a.docx
GRADED SET 2Acute CareFor Skill Set 2, you must complete a.docx
whittemorelucilla
 
IT 549 Final Project Guidelines and Rubric Overview .docx
IT 549 Final Project Guidelines and Rubric  Overview .docxIT 549 Final Project Guidelines and Rubric  Overview .docx
IT 549 Final Project Guidelines and Rubric Overview .docx
christiandean12115
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...
stuimrozsm
 
Effective Talent Management Strategy: Assessing Needs and Aspirations
Effective Talent Management Strategy: Assessing Needs and AspirationsEffective Talent Management Strategy: Assessing Needs and Aspirations
Effective Talent Management Strategy: Assessing Needs and Aspirations
Wowledge
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Jacqueline Fick
 

Similar a CIPM (20)

Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
 
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
 
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
 
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
 
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
 
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
 
Why Your Company Needs A Privacy Culture & Where To Start
Why Your Company Needs A Privacy Culture & Where To StartWhy Your Company Needs A Privacy Culture & Where To Start
Why Your Company Needs A Privacy Culture & Where To Start
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
 
GRADED SET 2Acute CareFor Skill Set 2, you must complete a.docx
GRADED SET 2Acute CareFor Skill Set 2, you must complete a.docxGRADED SET 2Acute CareFor Skill Set 2, you must complete a.docx
GRADED SET 2Acute CareFor Skill Set 2, you must complete a.docx
 
IT 549 Final Project Guidelines and Rubric Overview .docx
IT 549 Final Project Guidelines and Rubric  Overview .docxIT 549 Final Project Guidelines and Rubric  Overview .docx
IT 549 Final Project Guidelines and Rubric Overview .docx
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...
 
Introduction to Information Management.pptx
Introduction to Information Management.pptxIntroduction to Information Management.pptx
Introduction to Information Management.pptx
 
Compliance Program
Compliance ProgramCompliance Program
Compliance Program
 
Mentoring-Business-Case-Template-v4 (1).pptx
Mentoring-Business-Case-Template-v4 (1).pptxMentoring-Business-Case-Template-v4 (1).pptx
Mentoring-Business-Case-Template-v4 (1).pptx
 
ISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementationISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementation
 
Effective Talent Management Strategy: Assessing Needs and Aspirations
Effective Talent Management Strategy: Assessing Needs and AspirationsEffective Talent Management Strategy: Assessing Needs and Aspirations
Effective Talent Management Strategy: Assessing Needs and Aspirations
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
The benefits of technology standards it-toolkits
The benefits of technology standards   it-toolkitsThe benefits of technology standards   it-toolkits
The benefits of technology standards it-toolkits
 
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
 
Chapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfChapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdf
 

Más de Mustafa Kuğu

Más de Mustafa Kuğu (20)

Marmara Üniversitesi Mx Yaratıcı Endüstriler Çalıştayı 2024 (1).pdf
Marmara Üniversitesi Mx Yaratıcı Endüstriler Çalıştayı 2024 (1).pdfMarmara Üniversitesi Mx Yaratıcı Endüstriler Çalıştayı 2024 (1).pdf
Marmara Üniversitesi Mx Yaratıcı Endüstriler Çalıştayı 2024 (1).pdf
 
KVKK v.2.0 Güncel Yasa Değişiklikleri Notu.pdf
KVKK v.2.0 Güncel Yasa Değişiklikleri Notu.pdfKVKK v.2.0 Güncel Yasa Değişiklikleri Notu.pdf
KVKK v.2.0 Güncel Yasa Değişiklikleri Notu.pdf
 
PrismCRM-RealEstate-SalesCRM_byCode5Company
PrismCRM-RealEstate-SalesCRM_byCode5CompanyPrismCRM-RealEstate-SalesCRM_byCode5Company
PrismCRM-RealEstate-SalesCRM_byCode5Company
 
KVKK-Kararlar.pdf
KVKK-Kararlar.pdfKVKK-Kararlar.pdf
KVKK-Kararlar.pdf
 
CenturyDX-IT-Company
CenturyDX-IT-CompanyCenturyDX-IT-Company
CenturyDX-IT-Company
 
Dataliva Company Brief 2024
Dataliva Company Brief 2024Dataliva Company Brief 2024
Dataliva Company Brief 2024
 
Right Consulting Turkiye - Eng.pptx
Right Consulting Turkiye - Eng.pptxRight Consulting Turkiye - Eng.pptx
Right Consulting Turkiye - Eng.pptx
 
Three-S Retail Automation (AcilimSoft Product)
Three-S Retail Automation (AcilimSoft Product)Three-S Retail Automation (AcilimSoft Product)
Three-S Retail Automation (AcilimSoft Product)
 
Eng Three-S Hq (AcilimSoft Product)
Eng Three-S Hq (AcilimSoft Product)Eng Three-S Hq (AcilimSoft Product)
Eng Three-S Hq (AcilimSoft Product)
 
Telenity Solutions Brief
Telenity Solutions BriefTelenity Solutions Brief
Telenity Solutions Brief
 
Netmera Presentation.pdf
Netmera Presentation.pdfNetmera Presentation.pdf
Netmera Presentation.pdf
 
NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
 
NTGapps DTB Platform.pdf
NTGapps DTB Platform.pdfNTGapps DTB Platform.pdf
NTGapps DTB Platform.pdf
 
PRISMCRM_ENG_Real-Estate-CRM
PRISMCRM_ENG_Real-Estate-CRMPRISMCRM_ENG_Real-Estate-CRM
PRISMCRM_ENG_Real-Estate-CRM
 
Inypay Pitch Deck - March 2023-Latest copy 2.pdf
Inypay Pitch Deck - March 2023-Latest copy 2.pdfInypay Pitch Deck - March 2023-Latest copy 2.pdf
Inypay Pitch Deck - March 2023-Latest copy 2.pdf
 
Açık-Kaynak-Kod-Geçiş-Rehberi-2023.pdf
Açık-Kaynak-Kod-Geçiş-Rehberi-2023.pdfAçık-Kaynak-Kod-Geçiş-Rehberi-2023.pdf
Açık-Kaynak-Kod-Geçiş-Rehberi-2023.pdf
 
Startup Business Models
Startup Business ModelsStartup Business Models
Startup Business Models
 
Navigating VC Negotiations
Navigating VC NegotiationsNavigating VC Negotiations
Navigating VC Negotiations
 
Quantum Computing Market Report
Quantum Computing Market ReportQuantum Computing Market Report
Quantum Computing Market Report
 
Product Metrics
Product MetricsProduct Metrics
Product Metrics
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

CIPM

  • 1. Meet your privacy challenges head on with IAPP TRAINING Data Is One Of Your Most Valuable Assets Every day it is being accessed, shared, managed and transferred by people in your organization—in all departments and at all levels. Unless your employees have a solid understanding of the considerations and challenges involved in managing data, you risk a data breach, diminished customer trust and possible enforcement action. IAPP training can provide your staff with the knowledge they need to help you meet your privacy program goals of reduced risk, improved compliance, enhanced brand loyalty and more. The IAPP offers privacy and data protection training programs specifically designed to extend that knowledge to those on your team requiring a solid understanding of privacy principles and practices. In order to help you drive privacy knowledge across your organization, our comprehensive and flexible programs can be suited to your specific needs and availability. International Association of Privacy Professionals iapp.org 061917 is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high- performing privacy team. Those taking this course will learn the skills to manage privacy in an organization through process and technology—regardless of jurisdiction or industry. The Privacy Program Management training is based on the body of knowledge for the IAPP’s ANSI-accredited Certified Information Privacy Manager (CIPM) certification program. By investing in your staff with this globally recognized IAPP training, you’ll give them the knowledge to make better decisions in their everyday work, which is fundamental to the success of your privacy program. Privacy Program Management
  • 2. PRIVACY PROGRAM MANAGEMENT MODULES: Module 1: Introduction to privacy program management Identifies privacy program management responsibilities, and describes the role of accountability in privacy program management. Module 2: Privacy governance Examines considerations for developing and implementing a privacy program, including the position of the privacy function within the organization, role of the DPO, program scope and charter, privacy strategy, support and ongoing involvement of key functions and privacy frameworks. Module 3: Applicable laws and regulations Discusses the regulatory environment, common elements across jurisdictions and strategies for aligning compliance with organizational strategy. Module 4: Data assessments Relates practical processes for creating and using data inventories/maps, gap analyses, privacy assessments, privacy impact assessments/data protection impact assessments and vendor assessments. Module 5: Policies Describes common types of privacy-related policies, outlines components and offers strategies for implementation. Module 6: Data subject rights Discusses operational considerations for communicating and ensuring data subject rights, including privacy notice, choice and consent, access and rectification, data portability, and erasure and the right to be forgotten. Module 7: Training and awareness Outlines strategies for developing and implementing privacy training and awareness programs. Module 8: Protecting personal information Examines a holistic approach to protecting personal information through privacy by design. Module 9: Data breach incident plans Provides guidance on planning for and responding to a data security incident or breach. Module 10: Measuring, monitoring and auditing program performance Relates common practices for monitoring, measuring, analyzing and auditing privacy program performance. International Association of Privacy Professionals iapp.org 061917