Introduction
  • Why start learning GDPR Data Privacy with me?
  • What is included in this course?
  • Course Resources
  • My first promise to you - get certified in less than 30 days: CIPT, CIPM, CIPP/E
  • One more word before we start...
Understanding the need for privacy in IT environment
  • Evolving compliance requirements
  • Major Risks to a Company's IT Framework
  • Application Related Risks
  • Network Related Risks
  • Storage Related Risks
  • Stakeholder expectations for privacy
  • Privacy vs Security
  • IT Governance vs Data Governance
  • The role of the IT professional & other stakeholders in preserving
Core Privacy Concepts
  • Privacy Foundational elements - Organizational Privacy Notice
  • Privacy Foundational elements - Organizational Privacy Policy
  • Example - A great organizational privacy policy
  • Privacy Foundational elements - Organizational Security Policies
  • Incident Response - Security and Privacy Perspectives
  • System Development Lifecycle and Enterprise Architecture
  • Privacy Impact Assessments (PIA)
  • Common Privacy Principles
Privacy Considerations & Techniques
  • The Collection Process - Notice
  • The Collection Process - Choice, Control & Consent
  • Other topics related to Collection
  • Use
  • Security Practices and Limitations on Use
  • Disclosure
  • Retention - Records, Limitations, Access
  • Retention - Security Considerations
  • Destruction
Privacy in Systems and Applications
  • Identity and Access Management (IAM)
  • Limitations of Access Mgmt & Least Privilege principle
  • User Based Access Control & Role Based Access Control
  • Context of Authority
  • Cross Site Authentication & Authorization Models
  • Credit card information & Processing
  • PCI-DSS & PA-DSS
  • Remote Access & BYOD - Privacy & Security Considerations
  • Remote Access & BYOD - Access to Computers & Architecture controls
  • Data Encryption - Design Considerations
  • Application, Record and Field Encryption
  • File & Disk Encryption
  • Encryption Regulation & Crypto Standards
  • Other Privacy enhancing Technologies
  • Software Notifications and Agreements
GDPR Implementation - short intro guide!
  • GDPR short overview
  • Format and Definitions
  • Principles
  • Lawfulness
  • Gap Assessment
  • How to plan your project - preparation!
  • GDPR Roles
  • How to Capture Personal Data in a Form
  • GDPR Privacy Data Protection Policy
  • Data Subject Request Procedure
  • Data Protection Impact Assessment (DPIA)
  • How to treat data breaches
  • How to treat international transfers
  • ISO 27K and GDPR mapping
  • Privacy by Design
Online Privacy Issues
  • Organizational Privacy Strategy for Social Media
  • Consumer Expectations
  • Children's Online Privacy
  • Social media - personal information collected
  • Social media - personal information shared and ownership
  • E-commerce personalization
  • Online Advertising
  • Key considerations when posting ADs on your website
  • Understanding cookies, beacons and other tracking technologies
  • Cookies - Deep Dive
  • Web Browser Privacy and Security Features
Technologies with Privacy Considerations
  • Wireless Technology - RFID
  • Wireless Technology - NFC, Bluetooth & WiFi
  • Location Based Services (LBS) - generalities
  • Location Based Services (LBS) - GPS
  • Location Based Services (LBS) - GIS
  • Surveillance of Individuals
  • Data surveillance & Biometric recognition
Direct Marketing Challenges
  • Data Protection & Direct Marketing
  • The concept of Direct marketing
  • The right to opt-out
  • Marketing Requirements under e-Privacy Directive
  • Postal Marketing
  • Telephone Marketing
  • Electronic Marketing
  • Location Based Marketing
  • Online Behavioral Advertising (OBA) and GDPR
Lawful Processing of HR Data, Contracts & Recruiting
  • Where do privacy and HR meet?
  • More difficult to rely on Consent