SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
IAPP Certification Programs:
Overview
02.01.2019
About IAPP
• https://iapp.org
• The International Association of Privacy Professionals (IAPP) is the
largest and most comprehensive global information privacy
community and resource, helping practitioners develop and advance
their careers and organizations manage and protect their data.
• Founded in 2000
2
Type and cost:
• Professional – 275$
• Student – 50$
• Non-For-Profit / Retired / Government / Higher Education – 100$
3
IAPP Certification Programs
• Asia (CIPP/A)
• Canada (CIPP/C)
• Europe (CIPP/E)
• U.S. private-sector (CIPP/US)
• Government (CIPP/G)
CIPP/E + CIMP = GDPR Ready Bundle
4
5
The CIPP shows that you
understand the laws,
regulations and standards of
privacy in your jurisdiction or
discipline.
The CIPP is for you if you’re
responsible for:
• Legal
• Compliance
• Information management
• Data governance
• Human Resources
The CIPM says that you
understand how to use
process and technology to
manage privacy in an
organization—regardless of
the industry or jurisdiction.
The CIPM is for you if you’re
responsible for:
• Risk management
• Privacy operations
• Accountability
• Audit
• Privacy analytics
The CIPT shows that you
know how to manage and
build privacy requirements
and controls into technology.
The CIPT is for you if you’re
responsible for:
• Information technology
• Information security
• Software engineering
• Privacy by Design
Price and Questions
The IAPP’s CIPP/E, CIPP/US, CIPM and CIPT credentials are accredited by the American
National Standards Institute (ANSI) under the International Organization for
Standardization (ISO) standard 17024:2012.
6
About testing
• The IAPP offers two distinct testing modes—event-based paper-pencil
testing at our major conferences and test center computer-based testing.
Exam content is identical regardless of mode. Computer-based exams can be
purchased at any time through the IAPP Store. Event paper-pencil exams can
only be purchased through the registration process of the conference with a
fixed testing date and time and do not need to be scheduled.
• All IAPP examinations are administered in English. In addition, the CIPP/E
exam is available in French and German.
• Certification is a two-year term starting the day a candidate passes their
exam. During this term, certificants are expected to maintain certification by
submitting Continuing Privacy Education credits (CPE’s) -
https://iapp.org/certify/cpe-policy (min 20 credit hours of CPE)
7
Code of Professional Conduct (IAPP)
All IAPP certified individuals must agree to comply with the Certificant Code of
Professional Conduct as outlined below. Accordingly, by signing below you hereby
represent, warrant and covenant to the IAPP as follows:
• You will at all times conduct your business and/or professional activities with
courtesy, honesty and integrity.
• You will at all times represent your IAPP related certifications and qualifications
honestly and agree to only undertake those activities that you can reasonably
expect to complete with the necessary skills, knowledge and competence.
• You will not represent any IAPP certification in a misleading way or use an IAPP
certification in a manner that would bring the IAPP disrepute.
• You will strive to maintain and improve your professional knowledge and
competence through regular self-assessments and continuing education or
training.
• You will follow all certification policies, procedures, guidelines and requirements
of the IAPP that are made available to you by the IAPP, as the same may be
amended from time to time.
8
CIPP/E - Certified Information Privacy Professional
Developed in collaboration with the law firms, Bird and Bird, Field
Fisher, Wilson/Sonsini and Covington and Burling, the CIPP/E
encompasses pan-European and national data protection laws, key
privacy terminology and practical concepts concerning the protection
of personal data and trans-border data flows.
WHAT YOU'LL LEARN
• Introduction to European Data Protection
• European Regulatory Institutions
• Legislative Framework
• Compliance with European Data Protection Law
and Regulation
• International Data Transfers
9
I. Introduction to European Data
Protection
A. Origins and Historical Context of Data
Protection Law
B. European Union Institutions
C. Legislative Framework
III.Compliance with European Data
Protection Law and Regulation
A. Employment Relationship
B. Surveillance Activities
C. Direct Marketing
D. Internet Technology and
Communications
II. European Data Protection Law and
Regulation
A. Data Protection Concepts
B. Territorial and Material Scope of the
General Data Protection Regulation
C. Data Processing Principles
D. Lawful Processing Criteria
E. Information Provision Obligations
F. Data Subjects’ Rights
G. Security of Personal Data
H. Accountability Requirements
I. International Data Transfers
J. Supervision and enforcement
K. Consequences for GDPR
violations
CIPP/E Domains
10
CIPM - Certified Information Privacy Manager
The CIPM is the world’s first and only certification in privacy program
management. When you earn a CIPM, it shows that you don’t just
know privacy regulations—you know how to make it work for your
organization. In other words, you’re the go-to person for day-to-day
operations when it comes to privacy.
WHAT YOU'LL LEARN
• How to create a company vision
• How to structure the privacy team
• How to develop and implement a privacy program framework
• How to communicate to stakeholders
• How to measure performance
• The privacy program operational lifecycle
11
I. Privacy Program Governance
A. Organization Level
• a. Create a company vision
• b. Establish a privacy program
• c. Structure the privacy team
B. Develop the Privacy Program Framework
• a. Develop organizational privacy policies,
standards and/or guidelines
• b. Define privacy program activities
C. Implement the Privacy Policy Framework
• a. Communicate the framework to internal
and external stakeholders
• b. Ensure continuous alignment to applicable
laws and regulations to support the
• development of an organizational privacy
program framework
D. Metrics
• a. Identify intended audience for metrics
• b. Define reporting resources
• c. Define privacy metrics for oversight and
governance per audience
• d. Identify systems/application collection
points
II. Privacy Operational Life Cycle
A. Assess Your Organization
• a. Document current baseline of your privacy
program
• b. Processors and third-party vendor
assessment
• c. Physical assessments
• d. Mergers, acquisitions and divestitures
• e. Conduct analysis and assessments, as
needed or appropriate
B. Protect
• a. Data life cycle (creation to deletion)
• b. Information security practices
• c. Privacy by Design
C. Sustain
• a. Measure
• b. Align
• c. Audit
• d. Communicate
• e. Monitor
D. Respond
• a. Information requests
• b. Privacy incidents
12
CIPT - Certified Information Privacy Technologist
WHAT YOU'LL LEARN
• Critical privacy concepts and practices that impact IT
• Consumer privacy expectations and responsibility
• How to bake privacy into early stages of IT products and services for
cost control, accuracy and speed-to-market
• How to establish privacy practices for data collection and transfer
• How to preempt privacy issues in the Internet of Things
• How to factor privacy into data classification and emerging tech such
as cloud computing, facial recognition and surveillance
• How to communicate privacy issues with partners such as
management, development, marketing and legal.
13
I. Understanding the need for privacy in the IT
environment
A. Evolving Compliance Requirements
B. Major risks to a company’s IT framework
C. Stakeholder expectations for Privacy
D. Privacy vs. Security
II. Core Privacy Concepts
A. Foundational Elements for Embedding Privacy in IT
B. Common Privacy Principles
III. Privacy Considerations in the Information Life Cycle
A. Disclosure
B. Collection
C. Use
D. Retention
E. Destruction
IV. Privacy in Systems and Applications
A. The Enterprise IT Environment--Common Challenges
B. Identity and Access Management
C. Credit Card Information and Processing
D. Remote Access, Telecommuting, and Bringing Devices
to Work
E. Data Encryption
F. Other Privacy-Enhancing Technologies
G. Customer-Facing Applications
V. Privacy Techniques
A. Authentication Techniques
B. Identifiability
C. Data Protection by Design
VI. Online Privacy Issues
A. Specific Requirements for the Online
Environment
B. Social Media
C. Online Threats
D. Online Advertising
E. Tracking Technologies
F. Web Browser Privacy and Security
G. Web Security Protocols
VII. Technologies with Privacy
Considerations
A. Cloud Computing
B. Wireless IDs
C. Location-based Services
D. Smart Technologies
E. Video/data/audio
surveillance
F. Biometrics
14
IAPP Store: Exam Prep
Sample Questions (electronic version) – 25 $/35 $
GDPR Prep Online Bundle (CIPM) – 1495 $
• Privacy Program Management Online Training (The training
comprises 10 modules, which take a total of approximately 10 hours
to complete (one hour per module).)
• CIPM Certification Exam
• Sample Questions
• Privacy Program Management: Tools for Managing Privacy Within
Your Organization (Electronic Copy)
• 1 year Complimentary IAPP Membership
Privacy Program Management Online Training – 995 $ / 1195 $
15
Free resources
• 2018 Certification Candidate Handbook -
https://iapp.org/media/pdf/certification/IAPP-Privacy-Certification-
Candidate-Handbook3.1.0.pdf
• Glossary of Privacy Terms - https://iapp.org/resources/glossary
16

Mais conteúdo relacionado

Mais procurados

Patch Management Best Practices
Patch Management Best Practices Patch Management Best Practices
Patch Management Best Practices Ivanti
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptxNBBNOC
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & securitynadikari123
 
Azure Purview Data Toboggan Erwin de Kreuk
Azure Purview Data Toboggan Erwin de KreukAzure Purview Data Toboggan Erwin de Kreuk
Azure Purview Data Toboggan Erwin de KreukErwin de Kreuk
 
Software Design Document
Software Design DocumentSoftware Design Document
Software Design DocumentNadia Nahar
 
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...carlitocabana
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityOlivier Busolini
 
IT-Security "Must Have": Hardening as Part of a holistic Security Strategy
IT-Security "Must Have": Hardening as Part of a holistic Security StrategyIT-Security "Must Have": Hardening as Part of a holistic Security Strategy
IT-Security "Must Have": Hardening as Part of a holistic Security StrategyNoCodeHardening
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...Edureka!
 
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel SecurityLecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel SecurityDr. Ramchandra Mangrulkar
 
Introduction of grid computing
Introduction of grid computingIntroduction of grid computing
Introduction of grid computingPooja Dixit
 
Classifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoftClassifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoftDavid J Rosenthal
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection Syed Sabhi Haider
 

Mais procurados (20)

Patch Management Best Practices
Patch Management Best Practices Patch Management Best Practices
Patch Management Best Practices
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
Azure Purview Data Toboggan Erwin de Kreuk
Azure Purview Data Toboggan Erwin de KreukAzure Purview Data Toboggan Erwin de Kreuk
Azure Purview Data Toboggan Erwin de Kreuk
 
Software Design Document
Software Design DocumentSoftware Design Document
Software Design Document
 
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
IT-Security "Must Have": Hardening as Part of a holistic Security Strategy
IT-Security "Must Have": Hardening as Part of a holistic Security StrategyIT-Security "Must Have": Hardening as Part of a holistic Security Strategy
IT-Security "Must Have": Hardening as Part of a holistic Security Strategy
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
 
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel SecurityLecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
 
Information Security
Information SecurityInformation Security
Information Security
 
Introduction of grid computing
Introduction of grid computingIntroduction of grid computing
Introduction of grid computing
 
Classifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoftClassifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoft
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
 
Digital Forensic Case Study
Digital Forensic Case StudyDigital Forensic Case Study
Digital Forensic Case Study
 

Semelhante a IAPP certification programs overview

2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliantTrustArc
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationJim Kaplan CIA CFE
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...AIIM International
 
Privacy Frameworks: The Foundation for Every Privacy Program
Privacy Frameworks: The Foundation for Every Privacy ProgramPrivacy Frameworks: The Foundation for Every Privacy Program
Privacy Frameworks: The Foundation for Every Privacy ProgramTrustArc
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyFLUZO
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 Jim Kaplan CIA CFE
 
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsCCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsTrustArc
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerCapgemini
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesDimitri Sirota
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Jim Kaplan CIA CFE
 
Legal Issues For Online Communities - David Deakin
Legal Issues For Online Communities - David DeakinLegal Issues For Online Communities - David Deakin
Legal Issues For Online Communities - David DeakinFeverBee Limited
 
Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19Vinod Kashyap
 
EUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIPEUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIPScott Baron
 
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital MarketersOne North
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceCobweb
 
Whos role is it anyway
Whos role is it anywayWhos role is it anyway
Whos role is it anywayIRIS
 
5 Ways an IAPP Privacy Certification Can Boost Your Career
5 Ways an IAPP Privacy Certification Can Boost Your Career5 Ways an IAPP Privacy Certification Can Boost Your Career
5 Ways an IAPP Privacy Certification Can Boost Your CareerInfosec
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy ProgramDaniel Ayala
 

Semelhante a IAPP certification programs overview (20)

2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
Privacy Frameworks: The Foundation for Every Privacy Program
Privacy Frameworks: The Foundation for Every Privacy ProgramPrivacy Frameworks: The Foundation for Every Privacy Program
Privacy Frameworks: The Foundation for Every Privacy Program
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to Privacy
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6
 
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsCCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
 
GDPR Series Session 4
GDPR Series Session 4GDPR Series Session 4
GDPR Series Session 4
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
Legal Issues For Online Communities - David Deakin
Legal Issues For Online Communities - David DeakinLegal Issues For Online Communities - David Deakin
Legal Issues For Online Communities - David Deakin
 
Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19
 
EUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIPEUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIP
 
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to Compliance
 
Whos role is it anyway
Whos role is it anywayWhos role is it anyway
Whos role is it anyway
 
5 Ways an IAPP Privacy Certification Can Boost Your Career
5 Ways an IAPP Privacy Certification Can Boost Your Career5 Ways an IAPP Privacy Certification Can Boost Your Career
5 Ways an IAPP Privacy Certification Can Boost Your Career
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 

Mais de Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001

Mais de Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001 (20)

NIST Cybersecurity Framework (CSF) 2.0: What has changed?
NIST Cybersecurity Framework (CSF) 2.0: What has changed?NIST Cybersecurity Framework (CSF) 2.0: What has changed?
NIST Cybersecurity Framework (CSF) 2.0: What has changed?
 
pr ISMS Documented Information (lite).pdf
pr ISMS Documented Information (lite).pdfpr ISMS Documented Information (lite).pdf
pr ISMS Documented Information (lite).pdf
 
ISO Survey 2022: ISO 27001 certificates (ISMS)
ISO Survey 2022: ISO 27001 certificates (ISMS)ISO Survey 2022: ISO 27001 certificates (ISMS)
ISO Survey 2022: ISO 27001 certificates (ISMS)
 
12 Best Privacy Frameworks
12 Best Privacy Frameworks12 Best Privacy Frameworks
12 Best Privacy Frameworks
 
Cybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdfCybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdf
 
My 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
My 15 Years of Experience in Using Mind Maps for Business and Personal PurposesMy 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
My 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
 
From NIST CSF 1.1 to 2.0.pdf
From NIST CSF 1.1 to 2.0.pdfFrom NIST CSF 1.1 to 2.0.pdf
From NIST CSF 1.1 to 2.0.pdf
 
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
ISO 27001 How to use the ISMS Implementation Toolkit.pdfISO 27001 How to use the ISMS Implementation Toolkit.pdf
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
 
ISO 27001 How to accelerate the implementation.pdf
ISO 27001 How to accelerate the implementation.pdfISO 27001 How to accelerate the implementation.pdf
ISO 27001 How to accelerate the implementation.pdf
 
How to use ChatGPT for an ISMS implementation.pdf
How to use ChatGPT for an ISMS implementation.pdfHow to use ChatGPT for an ISMS implementation.pdf
How to use ChatGPT for an ISMS implementation.pdf
 
pr Privacy Principles 230405 small.pdf
pr Privacy Principles 230405 small.pdfpr Privacy Principles 230405 small.pdf
pr Privacy Principles 230405 small.pdf
 
ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO 27001:2022 Introduction
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
 
ISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdfISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdf
 
ISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdfISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdf
 
ISO Survey 2021: ISO 27001.pdf
ISO Survey 2021: ISO 27001.pdfISO Survey 2021: ISO 27001.pdf
ISO Survey 2021: ISO 27001.pdf
 
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdfAll about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
 
Supply management 1.1.pdf
Supply management 1.1.pdfSupply management 1.1.pdf
Supply management 1.1.pdf
 
Employee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdfEmployee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdf
 
GDPR RACI.pdf
GDPR RACI.pdfGDPR RACI.pdf
GDPR RACI.pdf
 

Último

一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxca2or2tx
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...James Watkins, III JD CFP®
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书SS A
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxSHIVAMGUPTA671167
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...Finlaw Associates
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteDeepikaK245113
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceanilsa9823
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 

Último (20)

一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 

IAPP certification programs overview

  • 2. About IAPP • https://iapp.org • The International Association of Privacy Professionals (IAPP) is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. • Founded in 2000 2
  • 3. Type and cost: • Professional – 275$ • Student – 50$ • Non-For-Profit / Retired / Government / Higher Education – 100$ 3
  • 4. IAPP Certification Programs • Asia (CIPP/A) • Canada (CIPP/C) • Europe (CIPP/E) • U.S. private-sector (CIPP/US) • Government (CIPP/G) CIPP/E + CIMP = GDPR Ready Bundle 4
  • 5. 5 The CIPP shows that you understand the laws, regulations and standards of privacy in your jurisdiction or discipline. The CIPP is for you if you’re responsible for: • Legal • Compliance • Information management • Data governance • Human Resources The CIPM says that you understand how to use process and technology to manage privacy in an organization—regardless of the industry or jurisdiction. The CIPM is for you if you’re responsible for: • Risk management • Privacy operations • Accountability • Audit • Privacy analytics The CIPT shows that you know how to manage and build privacy requirements and controls into technology. The CIPT is for you if you’re responsible for: • Information technology • Information security • Software engineering • Privacy by Design
  • 6. Price and Questions The IAPP’s CIPP/E, CIPP/US, CIPM and CIPT credentials are accredited by the American National Standards Institute (ANSI) under the International Organization for Standardization (ISO) standard 17024:2012. 6
  • 7. About testing • The IAPP offers two distinct testing modes—event-based paper-pencil testing at our major conferences and test center computer-based testing. Exam content is identical regardless of mode. Computer-based exams can be purchased at any time through the IAPP Store. Event paper-pencil exams can only be purchased through the registration process of the conference with a fixed testing date and time and do not need to be scheduled. • All IAPP examinations are administered in English. In addition, the CIPP/E exam is available in French and German. • Certification is a two-year term starting the day a candidate passes their exam. During this term, certificants are expected to maintain certification by submitting Continuing Privacy Education credits (CPE’s) - https://iapp.org/certify/cpe-policy (min 20 credit hours of CPE) 7
  • 8. Code of Professional Conduct (IAPP) All IAPP certified individuals must agree to comply with the Certificant Code of Professional Conduct as outlined below. Accordingly, by signing below you hereby represent, warrant and covenant to the IAPP as follows: • You will at all times conduct your business and/or professional activities with courtesy, honesty and integrity. • You will at all times represent your IAPP related certifications and qualifications honestly and agree to only undertake those activities that you can reasonably expect to complete with the necessary skills, knowledge and competence. • You will not represent any IAPP certification in a misleading way or use an IAPP certification in a manner that would bring the IAPP disrepute. • You will strive to maintain and improve your professional knowledge and competence through regular self-assessments and continuing education or training. • You will follow all certification policies, procedures, guidelines and requirements of the IAPP that are made available to you by the IAPP, as the same may be amended from time to time. 8
  • 9. CIPP/E - Certified Information Privacy Professional Developed in collaboration with the law firms, Bird and Bird, Field Fisher, Wilson/Sonsini and Covington and Burling, the CIPP/E encompasses pan-European and national data protection laws, key privacy terminology and practical concepts concerning the protection of personal data and trans-border data flows. WHAT YOU'LL LEARN • Introduction to European Data Protection • European Regulatory Institutions • Legislative Framework • Compliance with European Data Protection Law and Regulation • International Data Transfers 9
  • 10. I. Introduction to European Data Protection A. Origins and Historical Context of Data Protection Law B. European Union Institutions C. Legislative Framework III.Compliance with European Data Protection Law and Regulation A. Employment Relationship B. Surveillance Activities C. Direct Marketing D. Internet Technology and Communications II. European Data Protection Law and Regulation A. Data Protection Concepts B. Territorial and Material Scope of the General Data Protection Regulation C. Data Processing Principles D. Lawful Processing Criteria E. Information Provision Obligations F. Data Subjects’ Rights G. Security of Personal Data H. Accountability Requirements I. International Data Transfers J. Supervision and enforcement K. Consequences for GDPR violations CIPP/E Domains 10
  • 11. CIPM - Certified Information Privacy Manager The CIPM is the world’s first and only certification in privacy program management. When you earn a CIPM, it shows that you don’t just know privacy regulations—you know how to make it work for your organization. In other words, you’re the go-to person for day-to-day operations when it comes to privacy. WHAT YOU'LL LEARN • How to create a company vision • How to structure the privacy team • How to develop and implement a privacy program framework • How to communicate to stakeholders • How to measure performance • The privacy program operational lifecycle 11
  • 12. I. Privacy Program Governance A. Organization Level • a. Create a company vision • b. Establish a privacy program • c. Structure the privacy team B. Develop the Privacy Program Framework • a. Develop organizational privacy policies, standards and/or guidelines • b. Define privacy program activities C. Implement the Privacy Policy Framework • a. Communicate the framework to internal and external stakeholders • b. Ensure continuous alignment to applicable laws and regulations to support the • development of an organizational privacy program framework D. Metrics • a. Identify intended audience for metrics • b. Define reporting resources • c. Define privacy metrics for oversight and governance per audience • d. Identify systems/application collection points II. Privacy Operational Life Cycle A. Assess Your Organization • a. Document current baseline of your privacy program • b. Processors and third-party vendor assessment • c. Physical assessments • d. Mergers, acquisitions and divestitures • e. Conduct analysis and assessments, as needed or appropriate B. Protect • a. Data life cycle (creation to deletion) • b. Information security practices • c. Privacy by Design C. Sustain • a. Measure • b. Align • c. Audit • d. Communicate • e. Monitor D. Respond • a. Information requests • b. Privacy incidents 12
  • 13. CIPT - Certified Information Privacy Technologist WHAT YOU'LL LEARN • Critical privacy concepts and practices that impact IT • Consumer privacy expectations and responsibility • How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market • How to establish privacy practices for data collection and transfer • How to preempt privacy issues in the Internet of Things • How to factor privacy into data classification and emerging tech such as cloud computing, facial recognition and surveillance • How to communicate privacy issues with partners such as management, development, marketing and legal. 13
  • 14. I. Understanding the need for privacy in the IT environment A. Evolving Compliance Requirements B. Major risks to a company’s IT framework C. Stakeholder expectations for Privacy D. Privacy vs. Security II. Core Privacy Concepts A. Foundational Elements for Embedding Privacy in IT B. Common Privacy Principles III. Privacy Considerations in the Information Life Cycle A. Disclosure B. Collection C. Use D. Retention E. Destruction IV. Privacy in Systems and Applications A. The Enterprise IT Environment--Common Challenges B. Identity and Access Management C. Credit Card Information and Processing D. Remote Access, Telecommuting, and Bringing Devices to Work E. Data Encryption F. Other Privacy-Enhancing Technologies G. Customer-Facing Applications V. Privacy Techniques A. Authentication Techniques B. Identifiability C. Data Protection by Design VI. Online Privacy Issues A. Specific Requirements for the Online Environment B. Social Media C. Online Threats D. Online Advertising E. Tracking Technologies F. Web Browser Privacy and Security G. Web Security Protocols VII. Technologies with Privacy Considerations A. Cloud Computing B. Wireless IDs C. Location-based Services D. Smart Technologies E. Video/data/audio surveillance F. Biometrics 14
  • 15. IAPP Store: Exam Prep Sample Questions (electronic version) – 25 $/35 $ GDPR Prep Online Bundle (CIPM) – 1495 $ • Privacy Program Management Online Training (The training comprises 10 modules, which take a total of approximately 10 hours to complete (one hour per module).) • CIPM Certification Exam • Sample Questions • Privacy Program Management: Tools for Managing Privacy Within Your Organization (Electronic Copy) • 1 year Complimentary IAPP Membership Privacy Program Management Online Training – 995 $ / 1195 $ 15
  • 16. Free resources • 2018 Certification Candidate Handbook - https://iapp.org/media/pdf/certification/IAPP-Privacy-Certification- Candidate-Handbook3.1.0.pdf • Glossary of Privacy Terms - https://iapp.org/resources/glossary 16