• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Course Images

Certified Information Privacy Technologist (CIPT)

Certified Information Privacy Technologist (CIPT)

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • Delivered Online

  • Two days

  • All levels

Description

Duration

2 Days

12 CPD hours

This course is intended for

Data Protection Officers
IT Managers and Administrators
Records Managers
System Developers
IT Security specialist
Anyone who builds and develops IT systems

Overview

Critical data protection concepts and practices that impact IT
Consumer data protection expectations and responsibility
How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market
How to establish data protection practices for data collection and transfer
How to preempt data protection issues in the Internet of Things
How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance
How to communicate data protection issues with partners such as management, development, marketing and legal

The Principles of Privacy in Technology training is the how to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. The training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Technologist (CIPT) certification program.

Fundamentals of information privacy

  • Reviewing the modern history of privacy

  • Foundational privacy concepts

  • Data protection roles and fair information practices

  • Exploring the impacts of privacy and data protection regulations on information management

Privacy in the IT environment

  • Compliance requirements

  • IT risks

  • Stakeholder privacy expectations

  • Differentiating between privacy and security

Core privacy concepts

  • Foundational elements for embedding privacy in IT

  • Common privacy principles

  • Data protection by design and default

Privacy considerations in the information life cycle

  • Privacy considerations throughout the stages of the information life cycle

Privacy in systems and applications

  • Examining the risks inherent in the IT environment and options for addressing them

  • Identity and access management

  • Credit card information and processing

  • Remote access

  • BYOD and telecommuting

  • Data encryption

  • Additional privacy-enhancing technologies in the enterprise environment

Privacy techniques

  • Strengths and weaknesses of authentication techniques

  • Using identifiers

  • Privacy by design

Online privacy issues

  • Unique challenges that come from online privacy issues

  • Laws and regulations

  • Online threats

  • Social media

  • E-commerce

  • Tracking technologies

  • Web security protocols

Technologies with privacy considerations

  • Privacy considerations associated with a variety of technologies

  • Cloud computing

  • Wireless IDs

  • Location-based services

  • ?Smart? technologies

  • Video/data/audio surveillance

  • Biometric recognition

About The Provider

Nexus Human, established over 20 years ago, stands as a pillar of excellence in the realm of IT and Business Skills Training and education in Ireland and the UK....

Read more about Nexus Human

Tags

Reviews