IAPP Online Training

Live Online
CIPP/E, CIPM, CIPT & AIGP Training

Become GDPR ready with our live online training that includes the IAPP’s Certified Information Privacy Professional/Europe (CIPP/E) professional, Certified Information Privacy Management (CIPM) professional, Certified Information Privacy Technologist (CIPT) and AI Governance Professional (AIGP) training courses. Save 20% when taking our GDPR Ready Bundle training which includes both the CIPP/E and CIPM training.

This training is provided live online and can be attended remotely from any location.

Next Training Dates

CIPP/E
25 – 26 Nov 2024
CIPM
27 – 28 Nov 2024
CIPT
TBC
AIGP
2 – 3 Dec 2024

Distinguish Yourself

with IAPP Training and Certification

Advance your career, increase your earning potential and be a hero at your workplace. A certification from the IAPP validates your knowledge in data privacy – making you a key asset wherever you work.

Top 10 Benefits of an IAPP Certification

What You Get:

Quality Training Promise:

Pass the certification exam first time or attend another training with us for FREE and only pay for the exam fee.

What Will You Learn?

DATA PROTECTION LAWS

Introduces key European data protection laws and regulatory bodies, describing the evolution toward a harmonised legislative framework.

PERSONAL DATA

Defines and differentiates between certain types of data, including personal, anonymous, pseudo-anonymous and special categories.

CONTROLLERS AND PROCESSORS

Describes the role and relationships of controllers and processors.

PROCESSING PERSONAL DATA

Defines data processing and GDPR processing principles, explains the application of the GDPR and outline the legitimate bases for processing personal data.

INFORMATION PROVISION

Explains controller obligations for providing information about data processing activities to data subjects and supervisory authorities.

DATA SUBJECTS’ RIGHTS

Describes data subjects’ rights, applications of rights and controller and processor obligations.

SECURITY OF PROCESSING

Discusses considerations and duties of controllers and processors for ensuring security of personal data and providing notification of data breaches.

ACCOUNTABILITY

Investigates accountability requirements, including data protection management systems, data protection impact assessments, privacy policies and the role of the data protection officer.

CROSS-BORDER DATA TRASFERS

Outlines options and obligations for transferring data outside the European Economic Area, including adequacy decisions and appropriate safeguards and derogation.

SUPERVISORS AND ENFORCEMENT

Describes the role, powers and procedures of supervisory authorities; the composition and tasks of the European Data Protection Board; the role of the European Data Protection Supervisor; and remedies, liabilities and penalties for non-compliance.

COMPLIANCE

Discusses the applications of European data protection law, legal bases and compliance requirements for processing personal data in practice, including employers processing employee data, surveillance, direct marketing, Internet technology and communications and outsourcing.

INTRODUCTION TO PRIVACY PROGRAM MANAGEMENT

Identifies privacy program management responsibilities and describes the role of accountability in privacy program management.

PRIVACY GOVERNANCE

Examines considerations for developing and implementing a privacy program, including the position of the privacy function within the organisation, role of the DPO, program scope and charter, privacy strategy, support and ongoing involvement of key functions and privacy frameworks.

APPLICABLE LAWS AND REGULATIONS

Discusses the regulatory environment, common elements across jurisdictions and strategies for aligning compliance with organisational strategy.

DATA ASSESSMENTS

Relates practical processes for creating and using data inventories/maps, gap analyses, privacy assessments, privacy impact assessments/data protection impact assessments and vendor assessments.

POLICIES

Describes common types of privacy-related policies, outlines components and offers strategies for implementation.

DATA SUBJECTS’ RIGHTS

Discusses operational considerations for communicating and ensuring data subject rights, including privacy notice, choice and consent, access and rectification, data portability, and erasure and the right to be forgotten.

TRAINING AND AWARENESS

Online strategies for developing and implementing privacy training and awareness programs.

PROTECTING PERSONAL INFORMATION

Examines a holistic approach to protecting personal information through privacy by design.

DATA BREACH INCIDENT PLANS

Provides guidance on planning for and responding to a data security incident or breach.

MEASURING, MONITORING & AUDITING PROGRAM PERFORMANCE

Relates common practices for monitoring, measuring, analysing and auditing privacy program performance.

FOUNDATIONAL PRINCIPLES OF PRIVACY IN TECHNOLOGY Summarizes the foundational elements for embedding privacy in technology through privacy by design and value- sensitive design; reviews the data life cycle and common privacy risk models and frameworks.

THE ROLE OF THE TECHNOLOGY PROFESSIONAL IN PRIVACY

Reviews the fundamentals of privacy as they relate to the privacy technologist; describes the privacy technologist’s role in ensuring compliance with privacy requirements and meeting stakeholder privacy expectations; explores the relationship between privacy and security.

PRIVACY THREATS AND VIOLATIONS Identifies inherent risks throughout the stages of the data life cycle and explores how software security helps mitigate privacy threats; examines the impacts that behavioural advertising, cyberbullying and social engineering have on privacy within the technological environment.
TECHNICAL MEASURES AND PRIVACY-ENHANCING TECHNOLOGIES Outlines the strategies and techniques for enhancing privacy throughout the data life cycle, including: identity and access management; authentication, encryption, and aggregation; collection and use of personal information
PRIVACY ENGINEERING Explores the role of privacy engineering within an organization, including the objectives of privacy engineering, privacy design patterns, and software privacy risks.
PRIVACY-BY-DESIGN METHODOLOGY Illustrates the process and methodology of the privacy-by-design model; explores practices to ensure ongoing vigilance when implementing privacy by design.
TECHNOLOGY CHALLENGES FOR PRIVACY Examines the unique challenges that come from online privacy issues, including automated decision making, tracking and surveillance technologies, anthropomorphism, ubiquitous computing and mobile social computing.

FOUNDATIONS OF ARTIFICIAL INTELLIGENCE: Defines AI and machine learning, presents an overview of the different types of AI systems and their use cases, and positions AI models in the broader socio-cultural context.

AI IMPACTS ON PEOPLE AND RESPONSIBLE AI PRINCIPLES: Outlines the core risks and harms posed by AI systems, the characteristics of trustworthy AI systems, and the principles essential to responsible and ethical AI.

AI DEVELOPMENT LIFE CYCLE: Describes the AI development life cycle and the broad context in which AI risks are managed. 

IMPLEMENTING RESPONISBLE AI GOVERNANCE AND RISK MANAGEMENT: Explains how major AI stakeholders collaborate in a layered approach to manage AI risks while acknowledging AI systems’ potential societal benefits.

IMPLEMENTING AI PROJECTS AND SYSTEMS: Outlines mapping, planning and scoping AI projects, testing and validating AI systems during
development, and managing and monitoring AI systems after deployment.

CURRENT LAWS THAT APPLY TO AI SYSTEMS: Surveys the existing laws that govern the use of AI, outlines key GDPR intersections, and provides awareness of liability reform.

EXISTING AND EMERGING AI LAWS AND STANDARDS: Describes global AI-specific laws and the major frameworks and standards that exemplify how AI systems can be responsibly governed.

ONGOING AI ISSUES AND CONCERNS: Presents current discussions and ideas about AI governance, including awareness of legal issues, user
concerns, and AI auditing and accountability issues.

What People Are Saying

Testimonial

AMOSS Solicitors

“Kate was excellent and I found the course very informative and engaging.”

Testimonial

Direct Marketing Institute

“We invited David to speak for our member base on GDPR. His level of detail and presentation made for one of our most engaged webinars of the year, we can’t wait to have him back!”

Testimonial

Trinity College, Dublin

“Just wanted to say that people were really raving about your presentation yesterday. Which is no mean feat given the topic! So, thanks a million. We will arrange another.”

Testimonial

AIB, Ireland

“Very interactive and provided examples relevant to ‘real life’ ”

Testimonial

Tallaght University Hospital

“I just want to thank you so much for an excellent day’s training for myself and the whole team. We all thoroughly enjoyed it. You have showed us excellent attention to detail for the bespoke training, it was excellent from start to finish. You went into great detail which assisted our staff members to gain more knowledge and understating of the Legislation.”

Testimonial

Tesco, Ireland

“Very interesting & informative. Very well delivered.”

Send an enquiry

Name
Newsletter Subscribe
Hidden
Hidden
Hidden

Contact Details

Get in touch

What we do

Not quite ready to book?

Not ready to book or need a different date? No problem.
Leave us your details and our team will get back to you with any additional information and answer any questions you may have.

Not quite ready to book?

Not ready to book or need a different date? No problem.
Leave us your details and our team will get back to you with any additional information and answer any questions you may have.