

Integrated Data Privacy Professional (IDPP) Certification
Overview:
Introduction
As privacy regulations continue to evolve, organizations need to be confident that their privacy programs remain appropriate and effective. By attending this training course you’ll learn how to establish, maintain and manage a privacy program across all stages of its lifecycle, as well as understand privacy regulations and how to make them work for your organization.
Course Objectives
At the end of this course the participants will be able to:
- Be provided a competitive advantage in the marketplace
- be recognized as an experienced privacy program manager
- Gain the confidence to interpret privacy regulations and make them work for an organization
- develop the expertise to establish, maintain and manage a best-practice privacy program across all stages of its lifecycle, aligned to globally accepted standards, to ensure that your organization complies with regional data protection and privacy legislations
- Gain the necessary knowledge and skills required in order to prepare for the IDPP certification exam
Targeted Audience
- Data Protection Officers
- Data Protection Managers
- Compliance Professionals
- Information Managers
- Auditors
- Security Managers
- Anyone involved with data protection processes and programmes
Course Outline
Unit 1: Privacy Program Governance
- Organizational level
- Create a company vision
- Establish a privacy program
- Structure the privacy team
Unit 2: Develop the privacy framework
- Develop organizational privacy policies, standards and/or guidelines
- Define privacy program activities
Unit 3: Implement the privacy policy framework
- Communicate the framework to internal and external stakeholders
- Ensure continuous alignment to applicable laws and regulations
Unit 4: Metrics
- Identify intended audience
- Define resource for reporting
- Define privacy metrics
- Identify systems/applications collection points
Privacy Operational Life Cycle
- Assess your organization
- What do you currently do for privacy
- Processors and third-party vendor assessment
- Physical assessments
- Mergers, acquisitions and divestitures
Unit 5:
Protect
- Data lifecycle
- Information security practices
- Privacy by design
Sustain
- Measure
Respond
- Information requests
- Privacy incidents