We provide the most respected privacy training
CIPT (Certified Information Privacy Technologist) – Privacy in Technology
Privacy in Technology training isthe how-to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communicationtechnologies and systems.The training is based on the body of knowledge for the IAPP’s ANSI-accredited Certified Information Privacy Technologist (CIPT) certification program.
While not purely a “test prep” course, this training is appropriate for professionals who plan to certify, as well for those who want to deepen their privacy knowledge.
Module 1 : Foundational principles of privacy in technology
Summarizes the foundational elements for embedding privacy in technology through privacy by design and value-sensitive design; reviews the data life cycle and common privacy risk models and frameworks.
Module 2 : The role of the technology professional in privacy
Reviews the fundamentals of privacy as they relate to the privacy technologist; describes the privacy technologist’s role in ensuring compliance with privacy requirements and meeting stakeholder privacy expectations; explores the relationship between privacy and security.
Module 3 : Privacy threats and violations
Identifies inherent risks throughout the stages of the data life cycle and explores how software security helps mitigate privacy threats; examines the impacts that behavioral advertising, cyberbullying and social engineering have on privacy within the technological environment.
Module 4 : Technical measures and privacy-enhancing technologies
Outlines the strategies and techniques for enhancing privacy throughout the data life cycle, including: identity and access management; authentication, encryption, and aggregation; collection and use of personal information.
Module 5 : Privacy engineering
Explores the role of privacy engineering within an organization, including the objectives of privacy engineering, privacy design patterns, and software privacy risks.
Module 6 : Privacy-by-design methodology
Illustrates the process and methodology of the privacy-by-design model; explores practices to ensure ongoing vigilance when implementing privacy by design.
Module 7 : Technology challenges for privacy
Examines the unique challenges that come from online privacy issues, including automated decision making, tracking and surveillance technologies, anthropomorphism, ubiquitous computing and mobile social computing.