NetCom Learning

Certified Information Privacy Professional and Technologist U.S. Private Sector (CIPP/G, CIPT) Prep

Certified Information Privacy Professional and Technologist U.S. Private Sector (CIPP/G, CIPT) Prep Course Description

Duration: 3.00 days (24 hours)

IAPP

Certified Information Privacy Professional U.S. Private Sector (CIPP/US) + Certified Information Privacy Technologist (CIPT), you will gain foundational knowledge on concepts of privacy and data protection laws and practice. You will learn common principles and approaches to privacy as well as understand the major privacy models employed around the globe. An introduction to information security concepts and information security management and governance will be covered including frameworks, controls, and identity and access management. You will also learn about online privacy as it relates to using personal information on websites and other Internet-related technologies.

The structure of US law, the enforcement of US privacy and security laws, and information management from a US perspective will be discussed as well as the limitations on private-sector collection and usage of data. This course will also provide an introduction to workplace privacy considerations and US state laws related to marketing, financial data, data security and breach notification.

You will learn the need and importance for privacy in the IT environment with impacts such as regulatory activities, security threats, advances in technology and the proliferation of social networks. This course will provide an introduction to privacy laws, regulations, and standards impacting privacy in IT and the risks inherent in the IT environment. You will also learn about the importance of personally identifiable information and methods for ensuring its protection.

What's Included
- Authorized courseware
- Exam voucher
- IAPP Membership

Next Class Dates

Contact us to customize this class with your own dates, times and location. You can also call 1-888-563-8266 or chat live with a Learning Consultant.

Back to Top

Intended Audience for this Certified Information Privacy Professional and Technologist U.S. Private Sector (CIPP/G, CIPT) Prep Course

  • » Individuals who need a foundational understanding of information privacy and data protection in an IT environment
  • » Anyone interested in pursuing CIPP/US and CIPT certifications

Back to Top

Certified Information Privacy Professional and Technologist U.S. Private Sector (CIPP/G, CIPT) Prep Course Objectives

  • » Fundamentals of Information Privacy: Common Principles and Approaches to Privacy
  • » Jurisdictions and Industries
  • » Information Security: Safeguarding Personal Information
  • » Online Privacy: Using Personal Information and Websites and other Internet-Related Technologies
  • » United States Private Sector: US Privacy Environment
  • » Limits on Private-Sector Collection and Use of Data
  • » Government and Court Access to Private-Sector Information
  • » Workplace Privacy
  • » State Privacy Laws
  • » The Need for Privacy in the IT Environment
  • » Core Privacy Concepts
  • » Regulations and Standards
  • » Privacy in Systems and Applications
  • » De-Identifying and Anonymizing Personally Identification Information
  • » Cloud Computing
  • » Standards of Use
  • » Privacy Program Governance
  • » Privacy Operational Life Cycle

Back to Top

Certified Information Privacy Professional and Technologist U.S. Private Sector (CIPP/G, CIPT) Prep Course Outline

      1. Fundamentals of Information Privacy: Common Principles and Approaches to Privacy
        1. Modern History of Privacy
        2. Types of Information
        3. Risk Management Overview
        4. Modern Privacy Principles
      2. Jurisdictions and Industries
        1. Major Privacy Models around the Globe
        2. Privacy Regulation by Jurisdictions
        3. Privacy Regulation by Industry Sectors
      3. Information Security: Safeguarding Personal Information
        1. Information Security
          1. Definitions
          2. Elements
          3. Standards
          4. Threats and Vulnerabilities
        2. Information Security Management and Governance
          1. Frameworks
          2. Controls
          3. Cryptography
          4. Identity and Access Management (IAM)
      4. Online Privacy: Using Personal Information and Websites and other Internet-Related Technologies
        1. Privacy Considerations for Sensitive Online Information
          1. Notices
          2. Access
          3. Security
          4. Authentication Identification
          5. Data Collection
        2. Additional Online Privacy
          1. Children's Online Privacy
          2. Online Data Collection
          3. Email
          4. Searches
          5. Online Marketing and Advertising
          6. Social Media
          7. Online Assurance
          8. Cloud Computing
          9. Mobile Devices
      5. United States Private Sector: US Privacy Environment
        1. US Law Structure
        2. Enforcement of US Privacy and Security Laws
        3. Information Management from a US Perspective
      6. Limits on Private-Sector Collection and Use of Data
        1. Sector Limits
          1. Medical
          2. Financial
          3. Education
          4. Telecommunications
          5. Marketing
        2. Cross-Sector Privacy Protection by the Federal Trade Commission
      7. Government and Court Access to Private-Sector Information
        1. Privacy Law and Practice
          1. Law Enforcement
          2. National Security
          3. Civil Litigation
      8. Workplace Privacy
        1. Workplace Privacy
        2. Detailed Privacy Considerations
          1. Employment: Before, During, and After
          2. Background Checks
          3. Employee Monitoring
          4. Employee Misconduct Investigation
          5. Termination of Employment Relationship
      9. State Privacy Laws
        1. Marketing
        2. Financial Data
        3. Data Security
        4. Breach Notification
          1. Marketing
          2. Financial Data
          3. Data Security
          4. Breach Notification
        5. Privacy Technologist
      10. The Need for Privacy in the IT Environment
        1. IT Department Impacts
          1. Regulatory Activities
          2. Security Threats
          3. Advances in Technology
          4. Proliferation of Social Networks
      11. Core Privacy Concepts
        1. Attainable Privacy Compliance
          1. Information Lifecycle Plans
          2. Data Identification and Classification Systems
          3. Data Flow Diagrams
      12. Regulations and Standards
        1. Privacy Laws, Regulations and Standards
      13. Privacy in Systems and Applications
        1. Risks Inherent in the IT Environment
        2. Addressing Risks
      14. De-Identifying and Anonymizing Personally Identification Information
      15. Cloud Computing
        1. Privacy and Security Concerns with Cloud Services
      16. Standards of Use
      17. Privacy Program Governance
        1. Create a Privacy Program
          1. Company Vision
          2. Alignment to the Business
          3. Structure a Privacy Team
        2. Develop and Implement a Framework
          1. Organizational Privacy Policies
          2. Standards and Guidelines
        3. Establish Metrics to Measure Program Effectiveness
          1. Define Program Activities
          2. Define Program Metrics
      18. Privacy Operational Life Cycle
        1. Assess
          1. Document Privacy Baseline
          2. Data Processors and Third Party Vendor Assessments
          3. Physical Assessments
          4. Mergers, Acquisitions, and Divestures
          5. Privacy Threshold Analysis
          6. Privacy Impact Assessments
          7. Information Security Practices
        2. Protect
          1. Privacy by Design
          2. Integrating Privacy Requirements Across the Organization
        3. Sustain
          1. Auditing a Privacy Program
          2. Creating Awareness
          3. Compliance Monitoring
        4. Respond
          1. Handling Information Requests
          2. Handling Privacy Incidents

Back to Top

Do you have the right background for Certified Information Privacy Professional and Technologist U.S. Private Sector (CIPP/G, CIPT) Prep?

Skills Assessment

We ensure your success by asking all students to take a FREE Skill Assessment test. These short, instructor-written tests are an objective measure of your current skills that help us determine whether or not you will be able to meet your goals by attending this course at your current skill level. If we determine that you need additional preparation or training in order to gain the most value from this course, we will recommend cost-effective solutions that you can use to get ready for the course.

Our required skill-assessments ensure that:

  1. All students in the class are at a comparable skill level, so the class can run smoothly without beginners slowing down the class for everyone else.
  2. NetCom students enjoy one of the industry's highest success rates, and pass rates when a certification exam is involved.
  3. We stay committed to providing you real value. Again, your success is paramount; we will register you only if you have the skills to succeed.
This assessment is for your benefit and best taken without any preparation or reference materials, so your skills can be objectively measured.

Take your FREE Skill Assessment test »

Back to Top

Award winning, world-class Instructors

Our instructors are passionate at teaching and are experts in their respective fields. Our average NetCom instructor has many, many years of real-world experience and impart their priceless, valuable knowledge to our students every single day. See our world-class instructors.   See more instructors...

Back to Top

Client Testimonials & Reviews about their Learning Experience

We are passionate in delivering the best learning experience for our students and they are happy to share their learning experience with us.
Read what students had to say about their experience at NetCom.   Read student testimonials...

Back to Top