Download Interent ExplorerDownload Apple SafariDownload OperaDownload FirefoxDownload Google Chrome

CIPP/US and CIPT Certification Training bundle

CIPP/US and CIPT Certification Training bundle

CIPP/US and CIPT Certification Training bundle:

CIPP/US and CIPT Certification Training bundle course with Hands-on Exercises (Online, Onsite, and Classroom Live)

This CIPP/US and CIPT Certification Training bundle course is designed to prepare you for both the Certified Information Privacy Professional/United States (CIPP/US) and Certified Information Privacy Technologist (CIPT) certification exams.

The CIPP/US certification is designed for privacy and compliance officers as well as other professionals in privacy and data protection roles with a focus on U.S. privacy laws and regulations. You will learn about cross-sector limits on the collection and use of data and about specific regulations for the medical, financial, education, telecommunications, and marketing sectors. The course also covers laws governing access to private information by law enforcement and national security agencies, issues related to workplace privacy, and important state privacy laws.

The CIPT certification is designed to provide you with foundational knowledge about core privacy concepts and essential elements of embedding privacy in information technology. The course covers privacy considerations for every stage of the information life cycle as well as effective privacy-enhancing techniques and technologies, including access management, data encryption, and privacy-by-design principles. You will also learn about online services and technologies with specific privacy requirements and considerations, such as social media, cloud computing, and web browser privacy and security.

What’s Included
  • Four days of intense training delivered by CIPP/US and CIPT certified instructors with actual professional experience in data privacy and the security field
  • Official IAPP Courseware
  • CIPP/US and CIPT exam vouchers
  • One year of IAPP membership
  • 100% Satisfaction Guarantee

CIPP/US and CIPT Certification Details

The IAPP CIPP/US was launched in 2004 as the first professional certification in information privacy and remains the preeminent certification in the field of privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations and an understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S., the EU, and other jurisdictions.

The IAPP CIPT is the first global privacy certification for IT practitioners. It demonstrates an understanding of privacy and data protection practices in the development, engineering, deployment, and auditing of IT products and services at all stages of the information life cycle. The CIPT certifies individuals in their knowledge of privacy-related issues and practices in the context of the design and implementation of information and communication technologies.

RESOURCES
Related Courses
Customize It:
  • We can adapt this CIPP/US and CIPT Certification Training course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this CIPP/US and CIPT Certification Training course, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the CIPP/US and CIPT Certification Training around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the CIPP/US and CIPT Certification Training course in a manner understandable to lay audiences.
Audience / Target Group:

The target audience for this CIPP/US and CIPT Certification Training course:

  • Chief privacy officers (CPOs) and other senior information management professionals employed by a U.S.-based corporate organization or any organization with business or policy interests in the U.S.
  • Privacy managers, legal compliance officers, and risk managers
  • Members of a privacy or compliance team
  • Intermediate-level privacy professionals and entry-level candidates who are transitioning from non-privacy roles or who are entirely new to the privacy profession
  • Information management professionals in the U.S. financial services, healthcare or telecommunications industries who seek to broaden their expertise into a general information privacy scope
  • Information security professionals (CISO, CSO, CISSP)
  • Information auditing and IT governance professionals (CISA, CISM)
  • IT project/program managers
  • Enterprise system architects (CTO, CIO)
  • Business process professionals (purchase decision makers for IT services and products)
  • Software, network, database, and system professionals, including architects, designers, developers, engineers, and administrators
  • Anyone who wants to secure a place in the information economy
CIPP/US and CIPT Certification Training – Objectives:

After attending our CIPP/US and CIPT Certification Workshop, you will be able to successfully pass the IAPP CIPP/US and CIPT exams and will gain deep knowledge of the following key areas:

  • The U.S. legal system: definitions, sources of law, and the U.S. sectoral model for
    privacy enforcement
  • U.S. federal laws for the protection of personal data: FCRA and FACTA, HIPAA, GLBA
    and COPPA
  • U.S. federal regulation of marketing practices: TSR, DNC, CAN-SPAM, TCPA and
    JFPA
  • U.S. state data breach notification: California SB-1386 and select state laws
  • Regulation of privacy in the U.S. workplace: FCRA, EPP, ADA, and ECPA plus the best
    practices for privacy and background screening, employee testing, workplace monitoring, employee investigation, and termination of employment
  • Using industry-standard guidelines for the collection, use, disclosure, retention, and destruction of personal information
  • Recognizing IT risks and mistakes organizations make when embedding privacy in the IT environment
  • Privacy considerations for IT systems and applications
  • Using established methods for end-user notification and choice through IT system and product interfaces
  • Implementing system controls for identity and access management (IAM)
  • Selecting appropriate privacy-enabling technologies
  • Understanding requirements for identifiability, authentication, and anonymization
  • Understanding and addressing online privacy threats and challenges
  • Understanding privacy considerations in evolving technologies (cloud computing, biometrics, IoT, and more)
CIPP/US and CIPT Certification Training – Course Syllabus
Day 1: U.S. laws, models, and collecting data
  • Course Introduction
  • Structure of U.S. law and enforcement models
    • Common privacy principles
    • U.S. law sources, definitions, and authorities
    • Legal liability in the U.S.
    • U.S. approach to protecting privacy and security of information
  • Regulating the collection and use of data in the private sector
    • Federal trade commission privacy and security enforcement actions
    • HIPAA and other healthcare privacy regulations
    • Privacy in the financial sector
    • FERPA (education)
    • Privacy protection laws for telecommunications and marketing
Day 2: Access, privacy, and state laws
  • Access to private information by government and courts
    • Law enforcement access to financial data and communications
    • Laws related to national security
    • Privacy issues in civil litigation
  • Workplace privacy
    • General workplace privacy concerns
    • Human resources management
    • Relevant U.S. agencies and laws
    • Employee background screening
    • Employee monitoring and investigations
    • Employee termination
  • State privacy laws
    • Federal vs. state authority
    • Marketing laws
    • Financial data and data security laws
    • Overview of data breach notification laws
Day 3: Privacy fundamentals and life cycle
  • Importance of privacy in the IT environment
    • Privacy and regulatory compliance requirements
    • Privacy expectations
    • Risks to IT environments
    • Common mistakes
    • Privacy vs. security
    • Governance and role of IT professionals
  • Privacy fundamentals
    • Important privacy documents (notices and relevant security and privacy policies)
    • Relevant standards and frameworks
    • SDLC privacy and security
    • Privacy considerations in enterprise architecture (incident response, cross-border data transfers, and Privacy Impact Assessments)
    • Core privacy principles
  • Privacy in the information life cycle
    • Stages of the information life cycle
    • Privacy considerations for the collection of information
    • Privacy considerations for use of information
    • Privacy considerations for disclosure of information
    • Privacy considerations for retention of information
    • Privacy considerations for the destruction of information
Day 4: Privacy technologies, techniques, and controls
  • Privacy-enabling technologies and controls
    • Privacy challenges for enterprise IT architecture
    • Identity and access management (IAM)
    • Protecting credit card information
    • Privacy and security controls for remote access and mobile devices
    • Data encryption types, standards, and implementation
    • Automated data retrieval and audits
    • Data masking and obfuscation
    • Implementing DLP
    • Privacy considerations for customer-facing applications
  • Common privacy techniques
    • Authentication
    • Identifiability of data
    • Privacy-by-design principles
  • Privacy in an online environment
    • Online privacy expectations and requirements
    • Privacy challenges with social media
    • Common online threats and safeguards
    • E-commerce and advertising
    • Web tracking technologies (cookies, beacons, and more)
    • Machine-readable languages for privacy policies
    • Web browser privacy and security features
    • Secure web protocols (SSL/TLS, HTTPS)
  • Privacy and emerging technologies
    • Cloud computing privacy and security concerns
    • Wireless communications
    • Principles of location-based technologies and services
    • IoT and other smart technologies
    • Electronic surveillance
    • Biometrics
CIPP/US and CIPT Certification Training Course Wrap-Up

Whether you are looking for general information or have a specific question about CIPP/US Certification, we want to help!

Request More Information

    Time frame: