• Online, Instructor-Led
Course Description

Certified Information Privacy Technologist (CIPT)
Global Gold Standard for Privacy Professionals
ANSI/ISO Accredited
4-Day course
Why take Privacy Program Management Training?
Data protection authorities around the globe are enforcing regulations that mandate how data can be captured, stored and used. This makes technology, data and other professionals with dual literacy in both privacy and technology essential components to ensure operations meet privacy goals and mitigate risks.
Who should be trained?
Professionals within organizations who are tasked with ensuring privacy protocols are managed, data is safeguarded and privacy laws are observed. Roles within organizations with these duties include Privacy Officers, CISOs, IT Managers.
What will you learn?
The risk for organizations that do not comply with data privacy regulations is costly, as is the loss of customer trust. Companies that employ professionals with CIPT certifications are better able to apply strategies, policies, processes and techniques to manage cybersecurity risks while enabling prudent data use for business purposes. IAPP Certified Information Privacy Technologists can:
Build privacy-friendly products, services and processes by embedding data protection throughout every stage of development.
Recognize benefits and challenges of emerging technologies and how to use them while respecting customer privacy.
Protect data from various forms of interference.
Design software and systems to better ensure privacy.
Establish privacy practices for data security and control, such as minimization, limited access and encryption.
Audit infrastructure and communicate privacy issues with management, development, marketing and legal departments, and collaborate with them to produce solutions.

Learning Objectives

Build privacy-friendly products, services and processes by embedding data protection throughout every stage of development.
Recognize benefits and challenges of emerging technologies and how to use them while respecting customer privacy.
Protect data from various forms of interference.
Design software and systems to better ensure privacy.
Establish privacy practices for data security and control, such as minimization, limited access and encryption.
Audit infrastructure and communicate privacy issues with management, development, marketing and legal departments, and collaborate with them to produce solutions.

Framework Connections