Overview

With the ever-growing number of data protection laws and regulations, privacy responsibilities can land on almost anyone’s desk with no warning or training. Foundations provides ready-to-go knowledge for staff at any level of your organization to put to work immediately, even without being fully trained privacy professionals.

This introductory course allows organizations to cultivate in-house privacy knowledge in operational areas with growing privacy responsibilities, such as marketing, human resources, technology and finance. The course modules even integrate with corporate learning management systems for easy inclusion into existing training programs.

Read more +

Prerequisites

There are no prerequisites.

Read more +

Delegates will learn how to

Foundations of Privacy and Data Protection describes common operational processes, illustrates privacy at work through case studies and real-world examples, and teaches a common vocabulary to help professionals throughout organizations communicate privacy issues clearly.

Privacy and data protection experts with decades of experience developed the Foundations curriculum exclusively for the IAPP. Seven modules combine theoretical and practical content that teaches how to recognize and address fundamental privacy concepts, legal models and emerging issues.

This comprehensive training course quickly teaches privacy fundamentals to groups and individuals. It provides a practical understanding of basic principles and is excellent preparation for advanced IAPP training and certification testing. It is the first step toward building the credentials needed to join the fast-growing privacy profession.

Read more +

Outline

Module 1: Key Privacy Concepts

Introduces learners to the fundamental roles and concepts of privacy and data protection professionals charged with integrating sophisticated information management practices to safeguard personal data, earn customer and stakeholder trust, and meet the business and operational needs of their organizations.

Module 2: Fair Information Practices (FIPs)

Defines the FIPs, explore their origins, examine how they relate to one another to create a framework of data protection, and helps learners interpret them to solve data protection problems in regular work activity.

Module 3: The Data Life Cycle

Helps learners recognize each phase of the data life cycle, understand how each ties to relevant stakeholder needs and expectations, and identify gaps and propose improvements in data life cycle governance within their professional environments.

Module 4: Models for Data Protection Regulation

Examines the models for data protection, key differences between the main models, and their comparative advantages and disadvantages.

Module 5: Major Privacy and Data Protection Laws

Provides an overview of major privacy and data protection laws around the world to help learners better understand the evolving data protection landscape and its current state.

Module 6: Case Studies

Offers real-world examples of companies accused of failing to comply with data protection provisions, as well as success stories of those that worked effectively with regulators to protect personal data.

Module 7: Emerging Topics

Investigates key emerging topics related to data protection, defines a consistent methodology for examining and reacting to an emerging issue, and explores how to identify relevant components of a new topic, assess it and apply privacy principles.

Read more +

Why choose QA

Special Notices

This is an official IAPP course, which does not include IAPP membership.

Cyber Security learning paths

Want to boost your career in cyber security? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.

= Required
= Certification
AI Security
Application Security
Cyber Blue Team
Cybersecurity Maturity Model Certification (CMMC)
Cloud Security
DFIR Digital Forensics & Incident Response
Industrial Controls & OT Security
Information Security Management
NIST Pathway
Offensive Security
Privacy Professional
Reverse Engineer
Secure Coding
Security Auditor
Security Architect
Security Risk
Security Tech Generalist
Vulnerability Assessment & Penetration Testing