Certified Information Privacy Technologist (CIPT®) program - the first global privacy certification for IT practitioners. This two-day training provides guidance about critical privacy concepts, strategies, and techniques and will allow you to develop the skills to secure data at all stages of IT product and service lifecycles. The CIPT program was developed by the International Association of Privacy Professionals (IAPP) in conjunction with globally recognized privacy experts. It is accredited by ANSI under ANSI/ISO 17024: 2012 and recognized worldwide through a multilateral agreement with the International Accreditation Forum (IAF).
This training is a robust, interactive opportunity to learn about critical privacy concepts that are also integral to the CIPT exam.
Key topics covered include:
• Critical data protection concepts and practices that impact IT
• Consumer data protection expectations and responsibility
• How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market
• How to establish data protection practices for data collection and transfer
• How to preempt data protection issues in the Internet of Things
• How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance
• How to communicate data protection issues with partners such as management, development, marketing and legal
The CIPT credential shows you’ve got the knowledge to build your organisation’s data protection structures from the ground up. With regulators worldwide calling for tech professionals to factor data protection into their products and services, the job market for privacy-trained IT pros has never been stronger. While not purely a “test prep” course, this training is appropriate for professionals who plan to certify, as well for those who want to deepen their privacy knowledge. Both the training and the exam are based on the same body of knowledge.
Anyone who builds and develops IT systems, Data Protection Officers, Chief Privacy Officers, IT Managers and Administrators, Records Managers, System Developers, IT Security specialists.
A basic knowledge of English is required.
Pricing
€1.980 including toolkit, exam voucher and 1 year of IAPP Membership.
All prices are VAT excluded; course material and free lunch and beverages including morning and afternoon refreshments are included.
Take two IAPP training courses (CIPP/E, CIPM or CIPT combination) and receive a nice discount: 3550€ for both trainings. Please mention this combination during your subscription.
Cancellation
By Participant: If a subscribed course participant is replaced by another participant or if the public course is postponed to a later date, no cancellation costs apply. A participant or a group that fails to attend, or that cancels a course without at least 15 working days written notice prior to the course start, is liable for the full subscription cost.
By CTG: CTG reserves the right to cancel a course at any time.
Course Logistics
All classroom courses begin promptly at 9:00 am and are scheduled until 5 pm.
Please contact us if you wish further information. The standard language of each course is English.
* Prices subject to VAT
Module 1: Foundational principles of privacy in technology
Summarizes the foundational elements for embedding privacy in technology through privacy by design and value-sensitive design; reviews the data life cycle and common privacy risk models and frameworks.
Module 2: The role of the technology professional in privacy
Reviews the fundamentals of privacy as they relate to the privacy technologist; describes the privacy technologist’s role in ensuring compliance with privacy requirements and meeting stakeholder privacy expectations; explores the relationship between privacy and security.
Module 3: Privacy threats and violations
Identifies inherent risks throughout the stages of the data life cycle and explores how software security helps mitigate privacy threats; examines the impacts that behavioral advertising, cyberbullying and social engineering have on privacy within the technological environment.
Module 4: Technical measures and privacy-enhancing technologies
Outlines the strategies and techniques for enhancing privacy throughout the data life cycle, including: identity and access management; authentication, encryption, and aggregation; collection and use of personal information.
Module 5: Privacy engineering
Explores the role of privacy engineering within an organization, including the objectives of privacy engineering, privacy design patterns, and software privacy risks.
Module 6: Privacy-by-design methodology
Illustrates the process and methodology of the privacy-by-design model; explores practices to ensure ongoing vigilance when implementing privacy by design.
Module 7: Technology challenges for privacy
Examines the unique challenges that come from online privacy issues, including automated decision making, tracking and surveillance technologies, anthropomorphism, ubiquitous computing and mobile social computing.
Module 8: Technologies with Privacy Considerations
Describes specific privacy considerations associated with a variety of technologies including cloud computing, wireless IDs, location-based services, “smart” technologies, video/data/audio surveillance, and biometric recognition.
CTG Belgium NV
Culliganlaan 1D
1831 DIEGEM
Belgium
phone: +32 2 720 51 70
fax: +32 2 725 09 20
Buffalo,New York
300 Corporate Parkway
Suite 214N
Amherst, NY 14226
phone: +1 716 882 8000
fax: +1 716 887 7464