Data Protection
Training Services

01

Training Services

IAPP - Certified Information Privacy Management (CIPM) Training

The CIPM is the world’s first and only certification in information privacy management. When you earn a CIPM, you are demonstrating that you know how to make a privacy programme work for your organisation. With a CIPM accreditation, you will not only know about privacy regulation, but you will also know how to apply the regulations on a day to day operational basis in your organisation.


This course is ideal for DPOs and others who have responsibility for data protection compliance in their organisation. This two-day training course leads to a certification upon successful completion of the CIPM exam.

You can attend the CIPM training as part of our GDPR Ready bundle training and SAVE 20%

Click below for training details and the next training dates.

The course fee includes:

  • Two full days of training (9.30 am – 4.30 pm) from Pembroke Privacy IAPP Certified CIPM trainers
  • Small class size (limited to 15 delegates)
  • Lunch
  • Refreshments
  • Comprehensive course notes / participant guide
  • CIPM textbook (in hard copy and in soft copy format via the IAPP portal)
  • A certificate of attendance
  • One year’s membership of IAPP including online access to services via your dedicated “MyIAPP” account
  • CIPM qualification initial exam fee
  • Sample exam questions

CIPM Framework

Strategy

Create a strategy

Structure

Structure the team

Implement

Implement the framework

Report

Report to senior management

Assess

Asses the effectiveness of implementation

Adapt

Adapt implementation as needed

02

overview

What will you learn?

Module 1: Introduction to privacy program management – Identifies privacy program management responsibilities and describes the role of accountability in privacy program management.

Module 2: Privacy governance – Examines considerations for developing and implementing a privacy program, including the position of the privacy function within the organisation, role of the DPO, program scope and charter, privacy strategy, support and ongoing involvement of key functions and privacy frameworks.

Module 3: Applicable laws and regulations – Discusses the regulatory environment, common elements across jurisdictions and strategies for aligning compliance with organisational strategy.

Module 4: Data assessments – Relates practical processes for creating and using data inventories/maps, gap analyses, privacy assessments, privacy impact assessments/data protection impact assessments and vendor assessments.

Module 5: Policies – Describes common types of privacy-related policies, outlines components and offers strategies for implementation.

Module 6: Data subjects rights – Discusses operational considerations for communicating and ensuring data subject rights, including privacy notice, choice and consent, access and rectification, data portability, and erasure and the right to be forgotten.

Module 7: Training and awareness – Online strategies for developing and implementing privacy training and awareness programs.

Module 8: Protecting personal information – Examines a holistic approach to protecting personal information through privacy by design.

Module 9: Data breach incident plans – Provides guidance on planning for and responding to a data security incident or breach.

Module 10: Measuring, monitoring and auditing program performance – Relates common practices for monitoring, measuring, analysing and auditing privacy program performance.

04

contact

Enquire Now

Lorem consectetur ut quis sed mattis id Donec porta. Curabitur libero consequat.