SlideShare a Scribd company logo
IAPP Certification Programs:
Overview
02.01.2019
About IAPP
• https://iapp.org
• The International Association of Privacy Professionals (IAPP) is the
largest and most comprehensive global information privacy
community and resource, helping practitioners develop and advance
their careers and organizations manage and protect their data.
• Founded in 2000
2
Type and cost:
• Professional – 275$
• Student – 50$
• Non-For-Profit / Retired / Government / Higher Education – 100$
3
IAPP Certification Programs
• Asia (CIPP/A)
• Canada (CIPP/C)
• Europe (CIPP/E)
• U.S. private-sector (CIPP/US)
• Government (CIPP/G)
CIPP/E + CIMP = GDPR Ready Bundle
4
5
The CIPP shows that you
understand the laws,
regulations and standards of
privacy in your jurisdiction or
discipline.
The CIPP is for you if you’re
responsible for:
• Legal
• Compliance
• Information management
• Data governance
• Human Resources
The CIPM says that you
understand how to use
process and technology to
manage privacy in an
organization—regardless of
the industry or jurisdiction.
The CIPM is for you if you’re
responsible for:
• Risk management
• Privacy operations
• Accountability
• Audit
• Privacy analytics
The CIPT shows that you
know how to manage and
build privacy requirements
and controls into technology.
The CIPT is for you if you’re
responsible for:
• Information technology
• Information security
• Software engineering
• Privacy by Design
Price and Questions
The IAPP’s CIPP/E, CIPP/US, CIPM and CIPT credentials are accredited by the American
National Standards Institute (ANSI) under the International Organization for
Standardization (ISO) standard 17024:2012.
6
About testing
• The IAPP offers two distinct testing modes—event-based paper-pencil
testing at our major conferences and test center computer-based testing.
Exam content is identical regardless of mode. Computer-based exams can be
purchased at any time through the IAPP Store. Event paper-pencil exams can
only be purchased through the registration process of the conference with a
fixed testing date and time and do not need to be scheduled.
• All IAPP examinations are administered in English. In addition, the CIPP/E
exam is available in French and German.
• Certification is a two-year term starting the day a candidate passes their
exam. During this term, certificants are expected to maintain certification by
submitting Continuing Privacy Education credits (CPE’s) -
https://iapp.org/certify/cpe-policy (min 20 credit hours of CPE)
7
Code of Professional Conduct (IAPP)
All IAPP certified individuals must agree to comply with the Certificant Code of
Professional Conduct as outlined below. Accordingly, by signing below you hereby
represent, warrant and covenant to the IAPP as follows:
• You will at all times conduct your business and/or professional activities with
courtesy, honesty and integrity.
• You will at all times represent your IAPP related certifications and qualifications
honestly and agree to only undertake those activities that you can reasonably
expect to complete with the necessary skills, knowledge and competence.
• You will not represent any IAPP certification in a misleading way or use an IAPP
certification in a manner that would bring the IAPP disrepute.
• You will strive to maintain and improve your professional knowledge and
competence through regular self-assessments and continuing education or
training.
• You will follow all certification policies, procedures, guidelines and requirements
of the IAPP that are made available to you by the IAPP, as the same may be
amended from time to time.
8
CIPP/E - Certified Information Privacy Professional
Developed in collaboration with the law firms, Bird and Bird, Field
Fisher, Wilson/Sonsini and Covington and Burling, the CIPP/E
encompasses pan-European and national data protection laws, key
privacy terminology and practical concepts concerning the protection
of personal data and trans-border data flows.
WHAT YOU'LL LEARN
• Introduction to European Data Protection
• European Regulatory Institutions
• Legislative Framework
• Compliance with European Data Protection Law
and Regulation
• International Data Transfers
9
I. Introduction to European Data
Protection
A. Origins and Historical Context of Data
Protection Law
B. European Union Institutions
C. Legislative Framework
III.Compliance with European Data
Protection Law and Regulation
A. Employment Relationship
B. Surveillance Activities
C. Direct Marketing
D. Internet Technology and
Communications
II. European Data Protection Law and
Regulation
A. Data Protection Concepts
B. Territorial and Material Scope of the
General Data Protection Regulation
C. Data Processing Principles
D. Lawful Processing Criteria
E. Information Provision Obligations
F. Data Subjects’ Rights
G. Security of Personal Data
H. Accountability Requirements
I. International Data Transfers
J. Supervision and enforcement
K. Consequences for GDPR
violations
CIPP/E Domains
10
CIPM - Certified Information Privacy Manager
The CIPM is the world’s first and only certification in privacy program
management. When you earn a CIPM, it shows that you don’t just
know privacy regulations—you know how to make it work for your
organization. In other words, you’re the go-to person for day-to-day
operations when it comes to privacy.
WHAT YOU'LL LEARN
• How to create a company vision
• How to structure the privacy team
• How to develop and implement a privacy program framework
• How to communicate to stakeholders
• How to measure performance
• The privacy program operational lifecycle
11
I. Privacy Program Governance
A. Organization Level
• a. Create a company vision
• b. Establish a privacy program
• c. Structure the privacy team
B. Develop the Privacy Program Framework
• a. Develop organizational privacy policies,
standards and/or guidelines
• b. Define privacy program activities
C. Implement the Privacy Policy Framework
• a. Communicate the framework to internal
and external stakeholders
• b. Ensure continuous alignment to applicable
laws and regulations to support the
• development of an organizational privacy
program framework
D. Metrics
• a. Identify intended audience for metrics
• b. Define reporting resources
• c. Define privacy metrics for oversight and
governance per audience
• d. Identify systems/application collection
points
II. Privacy Operational Life Cycle
A. Assess Your Organization
• a. Document current baseline of your privacy
program
• b. Processors and third-party vendor
assessment
• c. Physical assessments
• d. Mergers, acquisitions and divestitures
• e. Conduct analysis and assessments, as
needed or appropriate
B. Protect
• a. Data life cycle (creation to deletion)
• b. Information security practices
• c. Privacy by Design
C. Sustain
• a. Measure
• b. Align
• c. Audit
• d. Communicate
• e. Monitor
D. Respond
• a. Information requests
• b. Privacy incidents
12
CIPT - Certified Information Privacy Technologist
WHAT YOU'LL LEARN
• Critical privacy concepts and practices that impact IT
• Consumer privacy expectations and responsibility
• How to bake privacy into early stages of IT products and services for
cost control, accuracy and speed-to-market
• How to establish privacy practices for data collection and transfer
• How to preempt privacy issues in the Internet of Things
• How to factor privacy into data classification and emerging tech such
as cloud computing, facial recognition and surveillance
• How to communicate privacy issues with partners such as
management, development, marketing and legal.
13
I. Understanding the need for privacy in the IT
environment
A. Evolving Compliance Requirements
B. Major risks to a company’s IT framework
C. Stakeholder expectations for Privacy
D. Privacy vs. Security
II. Core Privacy Concepts
A. Foundational Elements for Embedding Privacy in IT
B. Common Privacy Principles
III. Privacy Considerations in the Information Life Cycle
A. Disclosure
B. Collection
C. Use
D. Retention
E. Destruction
IV. Privacy in Systems and Applications
A. The Enterprise IT Environment--Common Challenges
B. Identity and Access Management
C. Credit Card Information and Processing
D. Remote Access, Telecommuting, and Bringing Devices
to Work
E. Data Encryption
F. Other Privacy-Enhancing Technologies
G. Customer-Facing Applications
V. Privacy Techniques
A. Authentication Techniques
B. Identifiability
C. Data Protection by Design
VI. Online Privacy Issues
A. Specific Requirements for the Online
Environment
B. Social Media
C. Online Threats
D. Online Advertising
E. Tracking Technologies
F. Web Browser Privacy and Security
G. Web Security Protocols
VII. Technologies with Privacy
Considerations
A. Cloud Computing
B. Wireless IDs
C. Location-based Services
D. Smart Technologies
E. Video/data/audio
surveillance
F. Biometrics
14
IAPP Store: Exam Prep
Sample Questions (electronic version) – 25 $/35 $
GDPR Prep Online Bundle (CIPM) – 1495 $
• Privacy Program Management Online Training (The training
comprises 10 modules, which take a total of approximately 10 hours
to complete (one hour per module).)
• CIPM Certification Exam
• Sample Questions
• Privacy Program Management: Tools for Managing Privacy Within
Your Organization (Electronic Copy)
• 1 year Complimentary IAPP Membership
Privacy Program Management Online Training – 995 $ / 1195 $
15
Free resources
• 2018 Certification Candidate Handbook -
https://iapp.org/media/pdf/certification/IAPP-Privacy-Certification-
Candidate-Handbook3.1.0.pdf
• Glossary of Privacy Terms - https://iapp.org/resources/glossary
16

More Related Content

What's hot

General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
Extentia Information Technology
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
Erick Kish, U.S. Commercial Service
 
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdfAll about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
Data Protection Predictions for 2023.pdf
Data Protection Predictions for 2023.pdfData Protection Predictions for 2023.pdf
Data Protection Predictions for 2023.pdf
DarylBallesteros3
 
EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)
Kimberly Simon MBA
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
DipanjanDey12
 
Adr v/s odr
Adr v/s odrAdr v/s odr
Adr v/s odr
pragati241997
 
Using NDAs CA_s Effectively - ACC Presentation Sept 30 2015 - FINAL.PDF
Using NDAs  CA_s Effectively - ACC Presentation Sept 30 2015 - FINAL.PDFUsing NDAs  CA_s Effectively - ACC Presentation Sept 30 2015 - FINAL.PDF
Using NDAs CA_s Effectively - ACC Presentation Sept 30 2015 - FINAL.PDF
Chase Irwin
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
PECB
 
Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020 Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020
Richard Swartzbaugh
 
California Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to ComplianceCalifornia Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to Compliance
Tinuiti
 
5G Microservices
5G Microservices5G Microservices
5G Microservices
Lumina Networks
 
12 ways a non-disclosure agreement is misused
12 ways a non-disclosure agreement is misused12 ways a non-disclosure agreement is misused
12 ways a non-disclosure agreement is misused
EveryNDA
 
ISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdfISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
FireEye, Inc.
 
Generative AI, Search Engines and GDPR
Generative AI, Search Engines and GDPRGenerative AI, Search Engines and GDPR
Generative AI, Search Engines and GDPR
David Erdos
 
ISO 31022 Management of Legal Risks IE Law School Masterclass Hernan Huwyler
ISO 31022 Management of Legal Risks IE Law School Masterclass Hernan Huwyler ISO 31022 Management of Legal Risks IE Law School Masterclass Hernan Huwyler
ISO 31022 Management of Legal Risks IE Law School Masterclass Hernan Huwyler
Hernan Huwyler, MBA CPA
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
Tanmay Shinde
 
SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)
James Neo
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
Mart Rovers
 

What's hot (20)

General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdfAll about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
 
Data Protection Predictions for 2023.pdf
Data Protection Predictions for 2023.pdfData Protection Predictions for 2023.pdf
Data Protection Predictions for 2023.pdf
 
EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
Adr v/s odr
Adr v/s odrAdr v/s odr
Adr v/s odr
 
Using NDAs CA_s Effectively - ACC Presentation Sept 30 2015 - FINAL.PDF
Using NDAs  CA_s Effectively - ACC Presentation Sept 30 2015 - FINAL.PDFUsing NDAs  CA_s Effectively - ACC Presentation Sept 30 2015 - FINAL.PDF
Using NDAs CA_s Effectively - ACC Presentation Sept 30 2015 - FINAL.PDF
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
 
Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020 Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020
 
California Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to ComplianceCalifornia Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to Compliance
 
5G Microservices
5G Microservices5G Microservices
5G Microservices
 
12 ways a non-disclosure agreement is misused
12 ways a non-disclosure agreement is misused12 ways a non-disclosure agreement is misused
12 ways a non-disclosure agreement is misused
 
ISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdfISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdf
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
Generative AI, Search Engines and GDPR
Generative AI, Search Engines and GDPRGenerative AI, Search Engines and GDPR
Generative AI, Search Engines and GDPR
 
ISO 31022 Management of Legal Risks IE Law School Masterclass Hernan Huwyler
ISO 31022 Management of Legal Risks IE Law School Masterclass Hernan Huwyler ISO 31022 Management of Legal Risks IE Law School Masterclass Hernan Huwyler
ISO 31022 Management of Legal Risks IE Law School Masterclass Hernan Huwyler
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
 

Similar to IAPP certification programs overview

2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant
TrustArc
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
Jim Kaplan CIA CFE
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
AIIM International
 
Privacy Frameworks: The Foundation for Every Privacy Program
Privacy Frameworks: The Foundation for Every Privacy ProgramPrivacy Frameworks: The Foundation for Every Privacy Program
Privacy Frameworks: The Foundation for Every Privacy Program
TrustArc
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to Privacy
FLUZO
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6
Jim Kaplan CIA CFE
 
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsCCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
TrustArc
 
GDPR Series Session 4
GDPR Series Session 4GDPR Series Session 4
GDPR Series Session 4
Jim Kaplan CIA CFE
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
Capgemini
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
Dimitri Sirota
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
Jim Kaplan CIA CFE
 
Legal Issues For Online Communities - David Deakin
Legal Issues For Online Communities - David DeakinLegal Issues For Online Communities - David Deakin
Legal Issues For Online Communities - David Deakin
FeverBee Limited
 
Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19
Vinod Kashyap
 
EUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIPEUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIP
Scott Baron
 
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
One North
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to Compliance
Cobweb
 
Whos role is it anyway
Whos role is it anywayWhos role is it anyway
Whos role is it anyway
IRIS
 
5 Ways an IAPP Privacy Certification Can Boost Your Career
5 Ways an IAPP Privacy Certification Can Boost Your Career5 Ways an IAPP Privacy Certification Can Boost Your Career
5 Ways an IAPP Privacy Certification Can Boost Your Career
Infosec
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
Daniel Ayala
 

Similar to IAPP certification programs overview (20)

2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
Privacy Frameworks: The Foundation for Every Privacy Program
Privacy Frameworks: The Foundation for Every Privacy ProgramPrivacy Frameworks: The Foundation for Every Privacy Program
Privacy Frameworks: The Foundation for Every Privacy Program
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to Privacy
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6
 
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsCCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
 
GDPR Series Session 4
GDPR Series Session 4GDPR Series Session 4
GDPR Series Session 4
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
Legal Issues For Online Communities - David Deakin
Legal Issues For Online Communities - David DeakinLegal Issues For Online Communities - David Deakin
Legal Issues For Online Communities - David Deakin
 
Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19
 
EUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIPEUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIP
 
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to Compliance
 
Whos role is it anyway
Whos role is it anywayWhos role is it anyway
Whos role is it anyway
 
5 Ways an IAPP Privacy Certification Can Boost Your Career
5 Ways an IAPP Privacy Certification Can Boost Your Career5 Ways an IAPP Privacy Certification Can Boost Your Career
5 Ways an IAPP Privacy Certification Can Boost Your Career
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 

More from Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001

NIST Cybersecurity Framework (CSF) 2.0: What has changed?
NIST Cybersecurity Framework (CSF) 2.0: What has changed?NIST Cybersecurity Framework (CSF) 2.0: What has changed?
NIST Cybersecurity Framework (CSF) 2.0: What has changed?
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
pr ISMS Documented Information (lite).pdf
pr ISMS Documented Information (lite).pdfpr ISMS Documented Information (lite).pdf
pr ISMS Documented Information (lite).pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
ISO Survey 2022: ISO 27001 certificates (ISMS)
ISO Survey 2022: ISO 27001 certificates (ISMS)ISO Survey 2022: ISO 27001 certificates (ISMS)
ISO Survey 2022: ISO 27001 certificates (ISMS)
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
12 Best Privacy Frameworks
12 Best Privacy Frameworks12 Best Privacy Frameworks
Cybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdfCybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
My 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
My 15 Years of Experience in Using Mind Maps for Business and Personal PurposesMy 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
My 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
From NIST CSF 1.1 to 2.0.pdf
From NIST CSF 1.1 to 2.0.pdfFrom NIST CSF 1.1 to 2.0.pdf
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
ISO 27001 How to use the ISMS Implementation Toolkit.pdfISO 27001 How to use the ISMS Implementation Toolkit.pdf
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
ISO 27001 How to accelerate the implementation.pdf
ISO 27001 How to accelerate the implementation.pdfISO 27001 How to accelerate the implementation.pdf
ISO 27001 How to accelerate the implementation.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
How to use ChatGPT for an ISMS implementation.pdf
How to use ChatGPT for an ISMS implementation.pdfHow to use ChatGPT for an ISMS implementation.pdf
How to use ChatGPT for an ISMS implementation.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
pr Privacy Principles 230405 small.pdf
pr Privacy Principles 230405 small.pdfpr Privacy Principles 230405 small.pdf
pr Privacy Principles 230405 small.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
ISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdfISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
ISO Survey 2021: ISO 27001.pdf
ISO Survey 2021: ISO 27001.pdfISO Survey 2021: ISO 27001.pdf
ISO Survey 2021: ISO 27001.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
Supply management 1.1.pdf
Supply management 1.1.pdfSupply management 1.1.pdf
Employee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdfEmployee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
GDPR RACI.pdf
GDPR RACI.pdfGDPR RACI.pdf
GDPR and Personal Data Transfers 1.1.pdf
GDPR and Personal Data Transfers 1.1.pdfGDPR and Personal Data Transfers 1.1.pdf
GDPR and Personal Data Transfers 1.1.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR EU Institutions and bodies.pdf
GDPR EU Institutions and bodies.pdfGDPR EU Institutions and bodies.pdf
GDPR EU Institutions and bodies.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 

More from Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001 (20)

NIST Cybersecurity Framework (CSF) 2.0: What has changed?
NIST Cybersecurity Framework (CSF) 2.0: What has changed?NIST Cybersecurity Framework (CSF) 2.0: What has changed?
NIST Cybersecurity Framework (CSF) 2.0: What has changed?
 
pr ISMS Documented Information (lite).pdf
pr ISMS Documented Information (lite).pdfpr ISMS Documented Information (lite).pdf
pr ISMS Documented Information (lite).pdf
 
ISO Survey 2022: ISO 27001 certificates (ISMS)
ISO Survey 2022: ISO 27001 certificates (ISMS)ISO Survey 2022: ISO 27001 certificates (ISMS)
ISO Survey 2022: ISO 27001 certificates (ISMS)
 
12 Best Privacy Frameworks
12 Best Privacy Frameworks12 Best Privacy Frameworks
12 Best Privacy Frameworks
 
Cybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdfCybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdf
 
My 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
My 15 Years of Experience in Using Mind Maps for Business and Personal PurposesMy 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
My 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
 
From NIST CSF 1.1 to 2.0.pdf
From NIST CSF 1.1 to 2.0.pdfFrom NIST CSF 1.1 to 2.0.pdf
From NIST CSF 1.1 to 2.0.pdf
 
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
ISO 27001 How to use the ISMS Implementation Toolkit.pdfISO 27001 How to use the ISMS Implementation Toolkit.pdf
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
 
ISO 27001 How to accelerate the implementation.pdf
ISO 27001 How to accelerate the implementation.pdfISO 27001 How to accelerate the implementation.pdf
ISO 27001 How to accelerate the implementation.pdf
 
How to use ChatGPT for an ISMS implementation.pdf
How to use ChatGPT for an ISMS implementation.pdfHow to use ChatGPT for an ISMS implementation.pdf
How to use ChatGPT for an ISMS implementation.pdf
 
pr Privacy Principles 230405 small.pdf
pr Privacy Principles 230405 small.pdfpr Privacy Principles 230405 small.pdf
pr Privacy Principles 230405 small.pdf
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
 
ISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdfISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdf
 
ISO Survey 2021: ISO 27001.pdf
ISO Survey 2021: ISO 27001.pdfISO Survey 2021: ISO 27001.pdf
ISO Survey 2021: ISO 27001.pdf
 
Supply management 1.1.pdf
Supply management 1.1.pdfSupply management 1.1.pdf
Supply management 1.1.pdf
 
Employee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdfEmployee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdf
 
GDPR RACI.pdf
GDPR RACI.pdfGDPR RACI.pdf
GDPR RACI.pdf
 
GDPR and Personal Data Transfers 1.1.pdf
GDPR and Personal Data Transfers 1.1.pdfGDPR and Personal Data Transfers 1.1.pdf
GDPR and Personal Data Transfers 1.1.pdf
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
GDPR EU Institutions and bodies.pdf
GDPR EU Institutions and bodies.pdfGDPR EU Institutions and bodies.pdf
GDPR EU Institutions and bodies.pdf
 

Recently uploaded

2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and ToolsThe Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
Milind Agarwal
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
Justin Ordoyo
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
HarpreetSaini48
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
ssusera97a2f
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Syed Muhammad Humza Hussain
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
RichardTheberge
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
sunitasaha5
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
ssuser559494
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
EbizfilingIndia
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
lawyersonia
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 

Recently uploaded (20)

2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and ToolsThe Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 

IAPP certification programs overview

  • 2. About IAPP • https://iapp.org • The International Association of Privacy Professionals (IAPP) is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. • Founded in 2000 2
  • 3. Type and cost: • Professional – 275$ • Student – 50$ • Non-For-Profit / Retired / Government / Higher Education – 100$ 3
  • 4. IAPP Certification Programs • Asia (CIPP/A) • Canada (CIPP/C) • Europe (CIPP/E) • U.S. private-sector (CIPP/US) • Government (CIPP/G) CIPP/E + CIMP = GDPR Ready Bundle 4
  • 5. 5 The CIPP shows that you understand the laws, regulations and standards of privacy in your jurisdiction or discipline. The CIPP is for you if you’re responsible for: • Legal • Compliance • Information management • Data governance • Human Resources The CIPM says that you understand how to use process and technology to manage privacy in an organization—regardless of the industry or jurisdiction. The CIPM is for you if you’re responsible for: • Risk management • Privacy operations • Accountability • Audit • Privacy analytics The CIPT shows that you know how to manage and build privacy requirements and controls into technology. The CIPT is for you if you’re responsible for: • Information technology • Information security • Software engineering • Privacy by Design
  • 6. Price and Questions The IAPP’s CIPP/E, CIPP/US, CIPM and CIPT credentials are accredited by the American National Standards Institute (ANSI) under the International Organization for Standardization (ISO) standard 17024:2012. 6
  • 7. About testing • The IAPP offers two distinct testing modes—event-based paper-pencil testing at our major conferences and test center computer-based testing. Exam content is identical regardless of mode. Computer-based exams can be purchased at any time through the IAPP Store. Event paper-pencil exams can only be purchased through the registration process of the conference with a fixed testing date and time and do not need to be scheduled. • All IAPP examinations are administered in English. In addition, the CIPP/E exam is available in French and German. • Certification is a two-year term starting the day a candidate passes their exam. During this term, certificants are expected to maintain certification by submitting Continuing Privacy Education credits (CPE’s) - https://iapp.org/certify/cpe-policy (min 20 credit hours of CPE) 7
  • 8. Code of Professional Conduct (IAPP) All IAPP certified individuals must agree to comply with the Certificant Code of Professional Conduct as outlined below. Accordingly, by signing below you hereby represent, warrant and covenant to the IAPP as follows: • You will at all times conduct your business and/or professional activities with courtesy, honesty and integrity. • You will at all times represent your IAPP related certifications and qualifications honestly and agree to only undertake those activities that you can reasonably expect to complete with the necessary skills, knowledge and competence. • You will not represent any IAPP certification in a misleading way or use an IAPP certification in a manner that would bring the IAPP disrepute. • You will strive to maintain and improve your professional knowledge and competence through regular self-assessments and continuing education or training. • You will follow all certification policies, procedures, guidelines and requirements of the IAPP that are made available to you by the IAPP, as the same may be amended from time to time. 8
  • 9. CIPP/E - Certified Information Privacy Professional Developed in collaboration with the law firms, Bird and Bird, Field Fisher, Wilson/Sonsini and Covington and Burling, the CIPP/E encompasses pan-European and national data protection laws, key privacy terminology and practical concepts concerning the protection of personal data and trans-border data flows. WHAT YOU'LL LEARN • Introduction to European Data Protection • European Regulatory Institutions • Legislative Framework • Compliance with European Data Protection Law and Regulation • International Data Transfers 9
  • 10. I. Introduction to European Data Protection A. Origins and Historical Context of Data Protection Law B. European Union Institutions C. Legislative Framework III.Compliance with European Data Protection Law and Regulation A. Employment Relationship B. Surveillance Activities C. Direct Marketing D. Internet Technology and Communications II. European Data Protection Law and Regulation A. Data Protection Concepts B. Territorial and Material Scope of the General Data Protection Regulation C. Data Processing Principles D. Lawful Processing Criteria E. Information Provision Obligations F. Data Subjects’ Rights G. Security of Personal Data H. Accountability Requirements I. International Data Transfers J. Supervision and enforcement K. Consequences for GDPR violations CIPP/E Domains 10
  • 11. CIPM - Certified Information Privacy Manager The CIPM is the world’s first and only certification in privacy program management. When you earn a CIPM, it shows that you don’t just know privacy regulations—you know how to make it work for your organization. In other words, you’re the go-to person for day-to-day operations when it comes to privacy. WHAT YOU'LL LEARN • How to create a company vision • How to structure the privacy team • How to develop and implement a privacy program framework • How to communicate to stakeholders • How to measure performance • The privacy program operational lifecycle 11
  • 12. I. Privacy Program Governance A. Organization Level • a. Create a company vision • b. Establish a privacy program • c. Structure the privacy team B. Develop the Privacy Program Framework • a. Develop organizational privacy policies, standards and/or guidelines • b. Define privacy program activities C. Implement the Privacy Policy Framework • a. Communicate the framework to internal and external stakeholders • b. Ensure continuous alignment to applicable laws and regulations to support the • development of an organizational privacy program framework D. Metrics • a. Identify intended audience for metrics • b. Define reporting resources • c. Define privacy metrics for oversight and governance per audience • d. Identify systems/application collection points II. Privacy Operational Life Cycle A. Assess Your Organization • a. Document current baseline of your privacy program • b. Processors and third-party vendor assessment • c. Physical assessments • d. Mergers, acquisitions and divestitures • e. Conduct analysis and assessments, as needed or appropriate B. Protect • a. Data life cycle (creation to deletion) • b. Information security practices • c. Privacy by Design C. Sustain • a. Measure • b. Align • c. Audit • d. Communicate • e. Monitor D. Respond • a. Information requests • b. Privacy incidents 12
  • 13. CIPT - Certified Information Privacy Technologist WHAT YOU'LL LEARN • Critical privacy concepts and practices that impact IT • Consumer privacy expectations and responsibility • How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market • How to establish privacy practices for data collection and transfer • How to preempt privacy issues in the Internet of Things • How to factor privacy into data classification and emerging tech such as cloud computing, facial recognition and surveillance • How to communicate privacy issues with partners such as management, development, marketing and legal. 13
  • 14. I. Understanding the need for privacy in the IT environment A. Evolving Compliance Requirements B. Major risks to a company’s IT framework C. Stakeholder expectations for Privacy D. Privacy vs. Security II. Core Privacy Concepts A. Foundational Elements for Embedding Privacy in IT B. Common Privacy Principles III. Privacy Considerations in the Information Life Cycle A. Disclosure B. Collection C. Use D. Retention E. Destruction IV. Privacy in Systems and Applications A. The Enterprise IT Environment--Common Challenges B. Identity and Access Management C. Credit Card Information and Processing D. Remote Access, Telecommuting, and Bringing Devices to Work E. Data Encryption F. Other Privacy-Enhancing Technologies G. Customer-Facing Applications V. Privacy Techniques A. Authentication Techniques B. Identifiability C. Data Protection by Design VI. Online Privacy Issues A. Specific Requirements for the Online Environment B. Social Media C. Online Threats D. Online Advertising E. Tracking Technologies F. Web Browser Privacy and Security G. Web Security Protocols VII. Technologies with Privacy Considerations A. Cloud Computing B. Wireless IDs C. Location-based Services D. Smart Technologies E. Video/data/audio surveillance F. Biometrics 14
  • 15. IAPP Store: Exam Prep Sample Questions (electronic version) – 25 $/35 $ GDPR Prep Online Bundle (CIPM) – 1495 $ • Privacy Program Management Online Training (The training comprises 10 modules, which take a total of approximately 10 hours to complete (one hour per module).) • CIPM Certification Exam • Sample Questions • Privacy Program Management: Tools for Managing Privacy Within Your Organization (Electronic Copy) • 1 year Complimentary IAPP Membership Privacy Program Management Online Training – 995 $ / 1195 $ 15
  • 16. Free resources • 2018 Certification Candidate Handbook - https://iapp.org/media/pdf/certification/IAPP-Privacy-Certification- Candidate-Handbook3.1.0.pdf • Glossary of Privacy Terms - https://iapp.org/resources/glossary 16