Certified Information Privacy Technologist (CIPT)
Privacy in Technology (Online self-paced learning + exam voucher)
Allnet Law
Summary
- Credit/Debit Card Online
- Invoice
- Bank Transfer
- Paypal
- Exam(s) / assessment(s) is included in price
Add to basket or enquire
Overview
The Certified Information Privacy Technologist (CIPT) certifies individuals in their knowledge of privacy-related issues and practices in the context of the design and implementation of information and communication technologies.
Become the First Defence for Privacy in Technology
Whether you work in the private or public sector, a Certified Information Privacy technologist (CIPT) credential will demonstrate you have the practical knowledge to apply privacy and data protection practices in the development, engineering, deployment or auditing of products and services.
Organisations of all sizes are significantly investing in technology and technologists to help ensure compliance with new privacy legislations. Develop the skills to identify problems, create technical solutions and implement privacy principles in compliance with sweeping data protection regulations.
Drawing from the expertise of leaders in privacy engineering and technology, the IAPP’s CIPT program covers the emerging tools and technologies for this expanding field. Now, the updated CIPT trainings and exam include 50% new content and will better prepare you in this unique domain.
The CIPT credential elevates your industry status.
WHAT’S INCLUDED WITH THE BUNDLE?
- Privacy in Technology Online Training
- Sample Questions
- Text Book – An Introduction to Privacy for Technology Professionals and Strategic Privacy by Design (electronic versions) immediately accessible through your MyIAPP portal.
- 1 year Complimentary IAPP Membership
(for existing IAPP members, your membership will be extended by 12 months) - CIPT Certification Exam Voucher
(The IAPP offers computer-based certification exams at over 6,000 testing centres worldwide. You will have a 12-month window to schedule your exam)
Note: Please allow up to 72 hours for processing of bundle products
Certification
Certified Information Privacy Technologist (CIPT)
Course media
Description
Module 1: Foundational principles of privacy in technology
Summarises the foundational elements for embedding privacy in technology through privacy by design and value sensitive design; reviews the data life cycle and common privacy risk models and frameworks
Module 2: The role of the technology professional in privacy
Reviews the fundamentals of privacy as they relate to the privacy technologist; describes the privacy technologist’s role in ensuring compliance with privacy requirements and meeting stakeholder privacy expectations; explores the relationship between privacy and security
Module 3: Privacy threats and violations
Identifies inherent risks throughout the stages of the data life cycle and explores how software security helps mitigate privacy threats; examines the impacts that behavioural advertising, cyberbullying and social engineering have on privacy within the technological environment
Module 4: Technical measures and privacy-enhancing technologies
Outlines the strategies and techniques for enhancing privacy throughout the data life cycle, including: identity and access management; authentication, encryption, and aggregation; collection and use of personal information
Module 5: Privacy engineering
Explores the role of privacy engineering within an organisation, including the objectives of privacy engineering, privacy design patterns, and software privacy risks
Module 6: Privacy-by-design methodology
Illustrates the process and methodology of the privacy-by-design model; explores practices to ensure ongoing vigilance when implementing privacy by design
Module 7: Technology challenges for privacy
Examines the unique challenges that come from online privacy issues, including automated decision making, tracking and surveillance technologies, anthropomorphism, ubiquitous computing and mobile social computing
Who is this course for?
- Data Protection Officers
- Data Protection Managers
- Auditors
- Legal Compliance Officers
- Security Manager
- Information Managers
- Anyone involved with data protection processes and programs
Requirements
System Requirements:
- Windows: Internet Explorer 11 or later, Microsoft Edge (latest version), Google Chrome (latest version) or Firefox (latest version)
- Mac: Safari (latest version), Google Chrome (latest version), or Firefox (latest version)
- Mobile: Safari in Apple iOS or later, Google Chrome in Apple iOS 8.1.2 or later or Google Chrome in Android OS 4.4 or later
Career path
- CIPM
- CIPP/E
Reviews
Currently there are no reviews for this course. Be the first to leave a review.
Legal information
This course is advertised on reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.