The Principles of Privacy in Technology training is the how to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. The training is based on the body of knowledge for the IAPP’s ANSI accredited Certified Information Privacy Technologist (CIPT) certification program.

starstarstarstarstar_half

* Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Learning Objectives

You will learn:

Critical data protection concepts and practices that impact IT
Consumer data protection expectations and responsibility
How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market
How to establish data protection practices for data collection and transfer
How to preempt data protection issues in the Internet of Things
How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance
How to communicate data protection issues with partners such as management, development, marketing and legal

1
  • Fundamentals of information privacy

  • Reviewing the modern history of privacy
    Foundational privacy concepts
    Data protection roles and fair information practices
    Exploring the impacts of privacy and data protection regulations on information management

2
  • Privacy in the IT environment

  • Compliance requirements
    IT risks
    Stakeholder privacy expectations
    Differentiating between privacy and security

3
  • Core privacy concepts

  • Foundational elements for embedding privacy in IT
    Common privacy principles
    Data protection by design and default

4
  • Privacy considerations in the information life cycle

  • Privacy considerations throughout the stages of the information life cycle

5
  • Privacy in systems and applications

  • Examining the risks inherent in the IT environment and options for addressing them
    Identity and access management
    Credit card information and processing
    Remote access
    BYOD and telecommuting
    Data encryption
    Additional privacy-enhancing technologies in the enterprise environment

6
  • Privacy techniques

  • Strengths and weaknesses of authentication techniques
    Using identifiers
    Privacy by design

7
  • Online privacy issues

  • Unique challenges that come from online privacy issues
    Laws and regulations
    Online threats
    Social media
    E-commerce
    Tracking technologies
    Web security protocols

8
  • Technologies with privacy considerations

  • Privacy considerations associated with a variety of technologies
    Cloud computing
    Wireless IDs
    Location-based services
    'Smart' technologies
    Video/data/audio surveillance
    Biometric recognition

Audience

This course is ideal for Data Protection Officers, IT Managers and Administrators, Records Managers, System Developers, IT Security specialist, anyone who builds and develops IT systems.

Language

English

Prerequisites

While there are no prerequisites for this course, please ensure you have the right level of experience to be successful in this training.

$2,855

Length: 2.0 days (16 hours)

Level:

Not Your Location? Change

Course Schedule:

To request a custom delivery, please chat with an expert.

Loading...