Course Highlights
  • Lessons from ex-Microsofter and IBMer
  • Will have a list of 61 templates/documents that will help them start GDPR programme
  • Understand what GDPR needs in order to achieve compliance
  • Go for CIPT, CIPM and CIPP/E certification by IAPP with a comprehensive learning plan explained in lesson 4
  • Will have a GDPR implementation guide
  • Understand Online privacy issues
  • Understand technologies with privacy considerations and core privacy concepts
  • Understand how technology will help in achieving compliance
  • Understand lawful processing from HR point of view
  • Understand how to work with Cloud Service Providers (CSPs)
Skills you will learn!
Curriculum

5 Topics
Why start learning GDPR Data Privacy with me?
What is included in this course?
Course Resources
My first promise to you - get certified in less than 30 days: CIPT CIPM CIPP/E
One more word before we start...

9 Topics
Evolving compliance requirements
Major Risks to a Company's IT Framework
Application Related Risks
Network Related Risks
Storage Related Risks
Stakeholder expectations for privacy
Privacy vs Security
IT Governance vs Data Governance
The role of the IT professional & other stakeholders in preserving

8 Topics
Privacy Foundational elements - Organizational Privacy Notice
Privacy Foundational elements - Organizational Privacy Policy
Example - A great organizational privacy policy
Privacy Foundational elements - Organizational Security Policies
Incident Response - Security and Privacy Perspectives
System Development Lifecycle and Enterprise Architecture
Privacy Impact Assessments (PIA)
Common Privacy Principles

9 Topics
The Collection Process - Notice
The Collection Process - Choice Control & Consent
Other topics related to Collection
Use
Security Practices and Limitations on Use
Disclosure
Retention - Records Limitations Access
Retention - Security Considerations
Destruction

15 Topics
Identity and Access Management (IAM)
Limitations of Access Mgmt & Least Privilege principle
User Based Access Control & Role Based Access Control
Context of Authority
Cross Site Authentication & Authorization Models
Credit card information & Processing
PCI-DSS & PA-DSS
Remote Access & BYOD - Privacy & Security Considerations
Remote Access & BYOD - Access to Computers & Architecture controls
Data Encryption - Design Considerations
Application Record and Field Encryption
File & Disk Encryption
Encryption Regulation & Crypto Standards
Other Privacy enhancing Technologies
Software Notifications and Agreements

15 Topics
GDPR short overview
Format and Definitions
Principles
Lawfulness
Gap Assessment
How to plan your project - preparation!
GDPR Roles
How to Capture Personal Data in a Form
GDPR Privacy Data Protection Policy
Data Subject Request Procedure
Data Protection Impact Assessment (DPIA)
How to treat data breaches
How to treat international transfers
ISO 27K and GDPR mapping
Privacy by Design

11 Topics
Organizational Privacy Strategy for Social Media
Consumer Expectations
Children's Online Privacy
Social media - personal information collected
Social media - personal information shared and ownership
E-commerce personalization
Online Advertising
Key considerations when posting ADs on your website
Understanding cookies beacons and other tracking technologies
Cookies - Deep Dive
Web Browser Privacy and Security Features

7 Topics
Wireless Technology - RFID
Wireless Technology - NFC Bluetooth & WiFi
Location Based Services (LBS) - generalities
Location Based Services (LBS) - GPS
Location Based Services (LBS) - GIS
Surveillance of Individuals
Data surveillance & Biometric recognition

9 Topics
Data Protection & Direct Marketing
The concept of Direct marketing
The right to opt-out
Marketing Requirements under e-Privacy Directive
Postal Marketing
Telephone Marketing
Electronic Marketing
Location Based Marketing
Online Behavioral Advertising (OBA) and GDPR

20 Topics
Where do privacy and HR meet?
More difficult to rely on Consent
Data Protection Principles from HR perspective
Consent_no_longer_an_option_for_HR
Legitimate interests
Pseudonymisation
Cross Border HR Data Transfers under GDPR
Changes to employee data management under GDPR
DPOs and DPIAs from HR perspective
Data Breaches & what to take away from that
Action Steps from HR perspective
HR related policies and procedures
Contracts of employment - what to look for
Data Protection Policy
GDPR terms and how they relate to recruiting?
Map your recruiting data
Create a privacy policy for recruiting
Source candidates online with care
Ensure you job application process complies with GDPR
Ensure your software vendors are compliant

21 Topics
Cloud and GDPR Concerns
Looking at GDPR the right way
Controllers and Processors
CSP as a processor and GDPR
Technical and Organisational measures
Subcontracting
Detailed impact on cloud contracts
Clauses between a processor and a sub-processor
Codes of conduct certifications and compliance
Important steps to compliance
Choosing a hosting provider
What businesses need to do
Software and CSPs to consider - part 1
Software and CSPs to consider - part 2
Software and CSPs to consider - part 3
Software and CSPs to consider - part 4
Advices for CSPs and Software providers
GDPR and IoT approach
There is far more in this space
GDPR requirements in an IoT context
Robots AI IoT and BigData

16 Topics
What is PSD 2 and main objectives
Benefits for consumers
Scope of PSD2 directive
New rules on authorisation and supervision
Security of Payments
New types of service providers - TPPs
Impact of PSD2 to financial services industry
New risks associated with the TPPs
Banks are caught between GDPR and PSD2
Other challenges - GDPR and PSD2
What is Open Banking Consent Model
Consent Step
Authentication Step
Authorisation Step
Redirection
Data Minimisation & Permissions

8 Topics
What you will going to see in this section
Identity Protection demo (AAD IP)
Privileged Identity Management demo (PIM)
Mobile Productivity policies demo (Intune)
Classification Labelling and Protection of Information demo (AIP)
Cloud application visibility and security demo (Cloud App Sec)
Security in cloud infrastructure environment demo
Defending and remediating endpoints from cloud demo

3 Topics
Top Privacy Mistakes and How to avoid them
BONUS - Remember my first promise to you? Learning plan differences
BONUS 2 - How to get more content and help me create more!

  Write a Review

Build EU GDPR data protection compliance from scratch

Go to Paid Course