Course Highlights
  • Privacy by Design
  • Privacy Interest
  • Create a Privacy Model
  • Use a Privacy by Design methodology
  • Perform Risk An analysis from privacy perspective
Curriculum

5 Topics
Introduction - Why Privacy by Design is extremely important
What you will learn in this course?
IAPP certification learning plan - CIPT CIPM CIPP/E
Powerpoint Presentations for download
One more word before we start...

8 Topics
How was privacy by design adopted during time!
Privacy by Design Principle 1
Privacy by Design Principle 2
Privacy by Design Principle 3
Privacy by Design Principle 4
Privacy by Design - Principles 5 6 and 7
Are there any challenges?
It is extremely important to include privacy from early stages!

16 Topics
What is this section about?
Individuals
Important Actors
Links and Relationships
Privacy by Design - Example 1
Privacy by Design - Example 2
Privacy by Design - Example 3
Violations - Overview
Information collection
Information processing (part 1)
Information processing (part 2)
Information dissemination (part 1)
Information dissemination (part 2)
Invasions
Centralization
Identifiability

14 Topics
Privacy Data-Oriented Strategies - SEPARATE
Privacy Data-Oriented Strategies - MINIMIZE (part 1)
Privacy Data-Oriented Strategies - MINIMIZE (part 2)
Privacy Data-Oriented Strategies - HIDE
Privacy Data-Oriented Strategies - ABSTRACT
Privacy Process-Oriented Strategies - ENFORCE
Privacy Process-Oriented Strategies - DEMONSTRATE
Privacy Process-Oriented Strategies - INFORM
Privacy Process-Oriented Strategies - CONTROL
Architecture Redux
Information Flow
Domains and Subdomains
App example
Exercises

12 Topics
Risk Analysis from Privacy perspective
A FAIR method for privacy risk
What is Frequency?
Vulnerability
Magnitude
How to apply controls (part 1)
How to apply controls (part 2)
Risk at the organization level
Quantitative Risk Management - example 1 (part 1)
Quantitative Risk Management - example 1 (part 2)
App Example
Exercises

10 Topics
The purpose of this methodology!
Quality Attributes
Identify Information Needs
Imposing Controls - ARCHITECT & SECURE
Imposing Controls - Supervise & Balance
Online Behavioral Advertising & Mobile Phone monitoring
Integrating privacy by design into the business
How the methodology meets the initial principles
The App under the methodology
Final Exercises

2 Topics
BONUS - Remember my first promise to you? Learning plan differences
BONUS 2 - How to get more content and help me create more!

  Write a Review

Ultimate Privacy by Design Data Protection Course(GDPR,LGPD)

Go to Paid Course