TRAININGS

We provide the most respected privacy training

CIPT (Certified Information Privacy Technologist) – Privacy in Technology

Privacy in Technology training isthe how-to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communicationtechnologies and systems.The training is based on the body of knowledge for the IAPP’s ANSI-accredited Certified Information Privacy Technologist (CIPT) certification program.

While not purely a “test prep” course, this training is appropriate for professionals who plan to certify, as well for those who want to deepen their privacy knowledge.

MODULES

Module 1 : Foundational principles of privacy in technology

Summarizes the foundational elements for embedding privacy in technology through privacy by design and value-sensitive design; reviews the data life cycle and common privacy risk models and frameworks.

Module 2 : The role of the technology professional in privacy

Reviews the fundamentals of privacy as they relate to the privacy technologist; describes the privacy technologist’s role in ensuring compliance with privacy requirements and meeting stakeholder privacy expectations; explores the relationship between privacy and security.

Module 3 : Privacy threats and violations

Identifies inherent risks throughout the stages of the data life cycle and explores how software security helps mitigate privacy threats; examines the impacts that behavioral advertising, cyberbullying and social engineering have on privacy within the technological environment.

Module 4 : Technical measures and privacy-enhancing technologies

Outlines the strategies and techniques for enhancing privacy throughout the data life cycle, including: identity and access management; authentication, encryption, and aggregation; collection and use of personal information.

Module 5 : Privacy engineering

Explores the role of privacy engineering within an organization, including the objectives of privacy engineering, privacy design patterns, and software privacy risks.

Module 6 : Privacy-by-design methodology

Illustrates the process and methodology of the privacy-by-design model; explores practices to ensure ongoing vigilance when implementing privacy by design.

Module 7 : Technology challenges for privacy

Examines the unique challenges that come from online privacy issues, including automated decision making, tracking and surveillance technologies, anthropomorphism, ubiquitous computing and mobile social computing.

Copyright © 2020 Fidele Consulting
All rights reserved

Call Us

+90 212 337 88 78