Add to basket or enquire
The Certified Information Privacy Technologist (CIPT) certifies individuals in their knowledge of privacy-related issues and practices in the context of the design and implementation of information and communication technologies.
Become the First Defence for Privacy in Technology
Whether you work in the private or public sector, a Certified Information Privacy technologist (CIPT) credential will demonstrate you have the practical knowledge to apply privacy and data protection practices in the development, engineering, deployment or auditing of products and services.
Organisations of all sizes are significantly investing in technology and technologists to help ensure compliance with new privacy legislations. Develop the skills to identify problems, create technical solutions and implement privacy principles in compliance with sweeping data protection regulations.
Drawing from the expertise of leaders in privacy engineering and technology, the IAPP’s CIPT program covers the emerging tools and technologies for this expanding field. Now, the updated CIPT trainings and exam include 50% new content and will better prepare you in this unique domain.
The CIPT credential elevates your industry status.
WHAT’S INCLUDED WITH THE BUNDLE?
- Privacy in Technology Online Training
- Sample Questions
- Text Book – An Introduction to Privacy for Technology Professionals and Strategic Privacy by Design (electronic versions) immediately accessible through your MyIAPP portal.
- 1 year Complimentary IAPP Membership
(for existing IAPP members, your membership will be extended by 12 months)
- CIPT Certification Exam Voucher
(The IAPP offers computer-based certification exams at over 6,000 testing centres worldwide. You will have a 12-month window to schedule your exam)
Note: Please allow up to 72 hours for processing of bundle products
Certified Information Privacy Technologist (CIPT)
Module 1: Foundational principles of privacy in technology
Summarises the foundational elements for embedding privacy in technology through privacy by design and value sensitive design; reviews the data life cycle and common privacy risk models and frameworks
Module 2: The role of the technology professional in privacy
Reviews the fundamentals of privacy as they relate to the privacy technologist; describes the privacy technologist’s role in ensuring compliance with privacy requirements and meeting stakeholder privacy expectations; explores the relationship between privacy and security
Module 3: Privacy threats and violations
Identifies inherent risks throughout the stages of the data life cycle and explores how software security helps mitigate privacy threats; examines the impacts that behavioural advertising, cyberbullying and social engineering have on privacy within the technological environment
Module 4: Technical measures and privacy-enhancing technologies
Outlines the strategies and techniques for enhancing privacy throughout the data life cycle, including: identity and access management; authentication, encryption, and aggregation; collection and use of personal information
Module 5: Privacy engineering
Explores the role of privacy engineering within an organisation, including the objectives of privacy engineering, privacy design patterns, and software privacy risks
Module 6: Privacy-by-design methodology
Illustrates the process and methodology of the privacy-by-design model; explores practices to ensure ongoing vigilance when implementing privacy by design
Module 7: Technology challenges for privacy
Examines the unique challenges that come from online privacy issues, including automated decision making, tracking and surveillance technologies, anthropomorphism, ubiquitous computing and mobile social computing
Who is this course for?
- Data Protection Officers
- Data Protection Managers
- Legal Compliance Officers
- Security Manager
- Information Managers
- Anyone involved with data protection processes and programs
- Windows: Internet Explorer 11 or later, Microsoft Edge (latest version), Google Chrome (latest version) or Firefox (latest version)
- Mac: Safari (latest version), Google Chrome (latest version), or Firefox (latest version)
- Mobile: Safari in Apple iOS or later, Google Chrome in Apple iOS 8.1.2 or later or Google Chrome in Android OS 4.4 or later
Currently there are no reviews for this course. Be the first to leave a review.