CDPO - Certified Chief Data Protection Officer (2024)

&nbsp

Brit Certifications and Assessments (BCAA) is a leading UK based certification body. This CB is formed to address the gap in the industry in IT and IT Security sector. The certification body leads in IT security, and IT certifications, and in particular doing it with highly pragmatic way.

&nbsp

BCAA UK works in hub and spoke model across the world.

&nbsp

CDPO - Certified Chief Data Protection Officer (1)

&nbsp

Data Privacy

&nbsp

Data privacy generally means the ability of a person to determine for themselves when, how, and to what extent personal information about them is shared with or communicated to others. This personal information can be one's name, location, contact information, or online or real-world behavior. Just as someone may wish to exclude people from a private conversation, many online users want to control or prevent certain types of personal data collection.

&nbsp

As Internet usage has increased over the years, so has the importance of data privacy. Websites, applications, and social media platforms often need to collect and store personal data about users in order to provide services. However, some applications and platforms may exceed users' expectations for data collection and usage, leaving users with less privacy than they realized. Other apps and platforms may not place adequate safeguards around the data they collect, which can result in a data breach that compromises user privacy.

&nbsp

ISO27701

&nbsp

ISO/IEC 27701:2019 is built to complement the widely used ISO/IEC 27001 and ISO/IEC 27002 standards for information security management. It specifies requirements and provides guidance for a Privacy Information Management System (PIMS), making the implementation of PIMS a helpful compliance addition for the many organizations that rely on ISO/IEC 27001, as well as creating a strong integration point for aligning security and privacy controls. ISO/IEC 27701 accomplishes this integration through a framework for managing personal data that can be used by both data controllers and data processors, a key distinction for General Data Protection Regulation (GDPR) compliance.

&nbsp

In addition, any ISO/IEC 27701 audit requires the organization to declare applicable laws/regulations in its criteria for the audit meaning that the standard can be mapped to many of the requirements under GDPR, California Consumer Privacy Act (CCPA), or other laws. Once mapped, the ISO/IEC 27701 operational controls are implemented by privacy professionals. An internal or external third party, who is accredited to assess, then evaluates the organization's compliance with the requirements of the standard and issues a certificate to that effect. This universal framework allows organizations to efficiently implement compliance with new regulatory requirements.

&nbsp

CDPO - Certified Chief Data Protection Officer (2)

&nbsp

Benefits:

&nbsp

•Helps with compliance audits.
•Ensures a consistent approach to information security management throughout an organization.
•Enables organizations to understand and manage risks in a systematic manner.
•Provides guidance on how to meet high-level objectives for information security management.
•Includes guidelines for implementing controls at each stage in the risk assessment process.
•Identifies key components that need to be addressed by organizational policies and procedures.
•Provides a framework for assessing effectiveness of implemented controls, including monitoring activities and reporting on results.

&nbsp

CDPO - Certified Chief Data Protection Officer (3)

&nbsp

&nbsp

Agenda

&nbsp

Module 1: Privacy Compliance Frameworks

•Material scope
•Territorial scope
•Governance
•Objectives
•Key processes
•Personal information management systems
•ISO/IEC 27001:2013
•Selecting and implementing a compliance framework
•Implementing the framework

&nbsp

Module 2: Role of the Data Protection Officer

&nbsp

•Voluntary designation of a Data Protection Officer
•Undertakings that share a DPO
•DPO on a service contract
•Publication of DPO contact details
•Position of the DPO
•Necessary resources
•Acting in an independent manner
•Protected role of the DPO
•Conflicts of interest
•Specification of the DPO
•Duties of the DPO
•The DPO and the organization
•The DPO and the supervisory authority
•Data protection impact assessments and risk management In house or contract

&nbsp

Module 3: Common Data Security Failures

&nbsp

Module 3: Common Data Security Failures

•Personal data breaches Anatomy of a data breach Sites of attack Securing your information
•ISO 27001
•Ten Steps to Cyber Security
•Cyber Essentials
•NIST standards
•The information security policy
•Assuring information security
•Governance of information security
•Information security beyond the organisation’s borders

&nbsp

Module 4: Six Data Protection Principles

&nbsp

•Principle 1: Lawfulness, fairness and transparency
•Principle 2: Purpose limitation
•Principle 3: Data minimisation
•Principle 4: Accuracy
•Principle 5: Storage limitation
•Principle 6: Integrity and confidentiality
•Accountability and compliance

&nbsp

Module 5: Requirements for Data Protection Impact Assessments

&nbsp

•Data protection impact assessments
•When to conduct a DPIA
•Who needs to be involved
•Data protection by design and by default

&nbsp

Module 6: Risk Management and DPIAs

&nbsp

•DPIAs as part of risk management
•Risk management standards and methodologies
•Risk responses
•Risk relationships
•Risk management and personal data

&nbsp

Module 7: Data Mapping

&nbsp

•Objectives and outcomes
•Four elements of data flow
•Data mapping, DPIAs and risk management

&nbsp

Module 8: Conducting DPIAs

&nbsp

•Reasons for conducting a DPIA
•Objectives and outcomes
•Consultation
•Five key stages of the DPIA
•Integrating the DPIA into the project plan

&nbsp

Module 9: Data Subjects’ Rights

&nbsp

•Fair processing
•The right to access
•The right to rectification
•The right to be forgotten
•The right to restriction of processing
•The right to data portability
•The right to object
•The right to appropriate decision making

&nbsp

Module 10: Consent

&nbsp

•Consent in a nutshell
•Withdrawing consent
•Alternatives to consent
•Practicalities of consent
Children
•Special categories of personal data
•Data relating to criminal convictions and offences

&nbsp

Module 11: Subject Access Requests

&nbsp

•The information to provide
•Data portability
•Responsibilities of the data controller
•Processes and procedures
• Options for confirming the requester’s identity
• Records to examine
• Time and money
•Dealing with bulk subject access requests
•Right to refusal

&nbsp

Module 12: Controllers and Processors

&nbsp

•Data controllers
• Joint controllers
•Data processors
•Controllers that are processors
•Controllers and processors outside the EU
•Records of processing
•Demonstrating compliance

&nbsp

Module 13: Managing Personal Data Internationally

&nbsp

•Key requirements
•Adequacy decisions
•Safeguards
•Binding corporate rules
•The EU-US Privacy Shield
•Privacy Shield Principles
•Limited transfers
•Cloud services

&nbsp

Module 14: Incident Response Management and Reporting Notification

&nbsp

•Events vs incidents
•Types of incident
•Cyber security incident response plans
•Key roles in incident management
•Prepare
•Respond
•Follow up

&nbsp

Module 15: GDPR Enforcement

&nbsp

• The hierarchy of authorities
• One-stop-shop mechanism
•Duties of supervisory authorities
•Powers of supervisory authorities
•Duties and powers of the European Data Protection Board
•Data subjects’ rights to redress
•Administrative fines
•The Regulation’s impact on other laws

&nbsp

Dual Certification

&nbsp

The training program carries dual certification.
1.ISO27701 Lead Implementer
2.Certified Chief Data Protection Officer

&nbsp

Exam:

&nbsp

The training is followed by a subjective ISO27701 exam after successful completion of the training.

CDPO certification is based on experience of the participant with more than 5 years’ experience in IT endorsed by the training partner.

&nbsp

Eligibility

&nbsp

•Managers or consultants seeking to prepare and support an organization in planning, implementing, and maintaining a compliance program based on the GDPR
•DPOs and individuals responsible for maintaining conformance with the GDPR requirements
•Members of information security, incident management, and business continuity teams
•Technical and compliance experts seeking to prepare for a data protection officer role
•Expert advisors involved in the security of personal data

&nbsp

Contact

&nbsp

BRIT CERTIFICATIONS AND ASSESSMENTS (UK),
128 City Road, London, EC1V 2NX,
United Kingdom enquiry@bcaa.uk
+44 203 476 4509

To Enroll classes, please contact us via enquiry@bcaa.uk

CDPO - Certified Chief Data Protection Officer (2024)
Top Articles
Latest Posts
Article information

Author: Mrs. Angelic Larkin

Last Updated:

Views: 5659

Rating: 4.7 / 5 (47 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Mrs. Angelic Larkin

Birthday: 1992-06-28

Address: Apt. 413 8275 Mueller Overpass, South Magnolia, IA 99527-6023

Phone: +6824704719725

Job: District Real-Estate Facilitator

Hobby: Letterboxing, Vacation, Poi, Homebrewing, Mountain biking, Slacklining, Cabaret

Introduction: My name is Mrs. Angelic Larkin, I am a cute, charming, funny, determined, inexpensive, joyous, cheerful person who loves writing and wants to share my knowledge and understanding with you.