CIPP/US, CIPT and CIPM Certification Training Bundle

Our six-day authorized CIPP/US, CIPT and CIPM Certification Training Bundle Seminar provides privacy professionals with the essential knowledge and understanding of U.S. privacy laws, technology concerns, and privacy policies and frameworks necessary to successfully pass all three certification exams.

This CIPP/US, CIPT and CIPM Certification Training Bundle course is designed to prepare you for the Certified Information Privacy Professional/United States (CIPP/US), Certified Information Privacy Technologist (CIPT) and Certified Information Privacy Manager (CIPM) certification exams.

  • The CIPP/US certification focuses on U.S. privacy laws and regulations. You will learn about cross-sector limits on the collection and use of data and about specific regulations for the medical, financial, education, telecommunications and marketing sectors. The course also covers laws governing access to private information by law enforcement and national security agencies, issues related to workplace privacy and important state privacy laws.
  • The CIPT certification focuses on core privacy concepts and essential elements of embedding privacy in information technology. The course covers privacy considerations for every stage of the information life cycle as well as effective privacy-enhancing techniques and technologies, including access management, data encryption and privacy-by-design principles. You will also learn about online services and technologies with specific privacy requirements and considerations, such as social media, cloud computing, and web browser privacy and security.
  • The CIPM certification focuses on privacy and data protection practices in the development, measurement and improvement of a privacy program. The course covers organizational-level privacy program governance, development, implementation and measurement of a privacy program framework as well as application of the privacy operational life cycle.

What's Included?

  • Six days of intense training delivered by CIPP/US, CIPT and CIPM certified instructors with actual professional experience in data privacy and the security field
  • CIPP/US all-in-one Courseware
  • CIPT all-in-one Courseware
  • CIPM all-in-one Courseware
  • CIPP/US, CIPT and CIPM exam vouchers
  • One year IAPP membership
  • 100% Satisfaction Guarantee
  • Exam Pass Guarantee

Privacy Certification Details:

The IAPP CIPP/US was launched in 2004 as the first professional certification in information privacy and remains the preeminent certification in the field of privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations and understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S., the EU and other jurisdictions.

The IAPP CIPT is the first global privacy certification for IT practitioners. It demonstrates understanding of privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services at all stages of the information life cycle. The CIPT certifies individuals in their knowledge of privacy-related issues and practices in the context of the design and implementation of information and communication technologies.

The IAPP CIPM was launched in 2013 as the first and only certification in privacy program management. It was developed in response to overwhelming demand to collect and collate common practices for managing privacy operations. The CIPM body of knowledge is comprised of two domains: privacy program governance and privacy program operational life cycle.

CIPP/US, CIPT and CIPM Certification Training BundleDuration: 6 days

  • We can adapt this CIPP/US, CIPT and CIPM Certification Training Bundle course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this CIPP/US, CIPT and CIPM Certification Training Bundle course, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the CIPP/US, CIPT and CIPM Certification Training Bundle Course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the CIPP/US, CIPT and CIPM Certification Training Bundle course in manner understandable to lay audiences.

The target audience for this CIPP/US, CIPT and CIPM Certification Bundle course:

  • Chief privacy officers (CPOs) and other senior information management professionals in both the U.S. public and private sectors or those employed by any organization with business or policy interests in the U.S.
  • Privacy managers, legal compliance officers and risk managers
  • Members of a privacy or compliance team
  • Intermediate-level privacy professionals and entry-level candidates who are transitioning from non-privacy roles or who are entirely new to the privacy profession
  • Information management professionals in the U.S. financial services, healthcare or telecommunications industries who seek to broaden their expertise into a general information privacy scope
  • Corporate managers who are responsible for privacy within their teams, such as human resources, procurement, marketing and customer relations
  • Non–privacy professionals who serve or support a privacy or compliance team and who need to achieve a consistent level of privacy education
  • Information security professionals (CISO, CISSP)
  • Information auditing and IT governance professionals (CISA, CISM)
  • IT project/program managers
  • Enterprise system architects (CTO, CIO)
  • Business process professionals (purchase decision makers for IT services and products)
  • Software, network, database and system professionals, including architects, designers, developers, engineers and administrators
  • Anyone who wants to secure a place in the information economy

The knowledge and skills that a learner must have before attending this CIPP/US, CIPT and CIPM Certification Training Bundle course are:

  • N/A
CIPP/US, CIPT and CIPM Certification Training Bundle - OBJECTIVES

After attending our CIPP/US, CIPT and CIPM Seminar, you will be able to successfully pass the IAPP CIPP/US, CIPT and CIPM exams and will gain deep knowledge of the following key areas:

  • The U.S. legal system: definitions, sources of law and the U.S. sectoral model for
    privacy enforcement
  • U.S. federal laws for protection of personal data: FCRA and FACTA, HIPAA, GLBA
    and COPPA
  • U.S. federal regulation of marketing practices: TSR, DNC, CAN-SPAM, TCPA and
  • U.S. state data breach notification: California SB-1386 and select state laws
  • Regulation of privacy in the U.S. workplace: FCRA, EPP, ADA and ECPA plus best practices for privacy and background screening, employee testing, workplace monitoring, employee investigation and termination of employment
  • Using industry-standard guidelines for the collection, use, disclosure, retention and destruction of personal information
  • Recognizing IT risks and mistakes organizations make when embedding privacy in the IT environment
  • Privacy considerations for IT systems and applications
  • Using established methods for end-user notification and choice through IT system and product interfaces
  • Implementing system controls for identity and access management (IAM)
  • Selecting appropriate privacy-enabling technologies
  • Understanding requirements for identifiability, authentication and anonymization
  • Understanding and addressing online privacy threats and challenges
  • Understanding privacy considerations in evolving technologies (cloud computing, biometrics, IoT and more)
  • Organizational privacy concerns, including creating a company vision, structuring the privacy team and communicating with stakeholders
  • Developing and implementing a privacy program framework
  • Measuring performance
  • The privacy operational life cycle
CIPP/US, CIPT and CIPM Certification Training Bundle - COURSE SYLLABUS

Day 1: U.S. laws, models and collecting data

  • Course introduction
  • Structure of U.S. law and enforcement models
    • Common privacy principles
    • U.S. law sources, definitions and authorities
    • Legal liability in the U.S.
    • U.S. approach to protecting privacy and security of information
  • Regulating collection and use of data in the private sector
    • Federal trade commission privacy and security enforcement actions
    • HIPAA and other healthcare privacy regulations
    • Privacy in financial sector
    • FERPA (education)
    • Privacy protection laws for telecommunications and marketing

Day 2: Access, privacy and state laws

  • Access to private information by government and courts
    • Law enforcement access to financial data and communications
    • Laws related to national security
    • Privacy issues in civil litigation
  • Workplace privacy
    • General workplace privacy concerns
    • Human resources management
    • Relevant U.S. agencies and laws
    • Employee background screening
    • Employee monitoring and investigations
    • Employee termination
  • State privacy laws
    • Federal vs. state authority
    • Marketing laws
    • Financial data and data security laws
    • Overview of data breach notification laws

Day 3: Privacy fundamentals and life cycle

  • Importance of privacy in IT environment
    • Privacy and regulatory compliance requirements
    • Privacy expectations
    • Risks to IT environments
    • Common mistakes
    • Privacy vs. security
    • Governance and role of IT professionals
  • Privacy fundamentals
    • Important privacy documents (notices and relevant security and privacy policies)
    • Relevant standards and frameworks
    • SDLC privacy and security
    • Privacy considerations in enterprise architecture (incident response, cross-border data transfers and Privacy Impact Assessments)
    • Core privacy principles
  • Privacy in the information life cycle
    • Stages of the information life cycle
    • Privacy considerations for collection of information
    • Privacy considerations for use of information
    • Privacy considerations for disclosure of information
    • Privacy considerations for retention of information
    • Privacy considerations for destruction of information

Day 4: Privacy technologies, techniques and controls

  • Privacy-enabling technologies and controls
    • Privacy challenges for enterprise IT architecture
    • Identity and access management (IAM)
    • Protecting credit card information
    • Privacy and security controls for remote access and mobile devices
    • Data encryption types, standards and implementation
    • Automated data retrieval and audits
    • Data masking and obfuscation
    • Implementing DLP
    • Privacy considerations for customer-facing applications
  • Common privacy techniques
    • Authentication
    • Identifiability of data
    • Privacy-by-design principles
  • Privacy in online environment
    • Online privacy expectations and requirements
    • Privacy challenges with social media
    • Common online threats and safeguards
    • E-commerce and advertising
    • Web tracking technologies (cookies, beacons and more)
    • Machine-readable languages for privacy policies
    • Web browser privacy and security features
    • Secure web protocols (SSL/TLS, HTTPS)
  • Privacy and emerging technologies
    • Cloud computing privacy and security concerns
    • Wireless communications
    • Principles of location-based technologies and services
    • IoT and other smart technologies
    • Electronic surveillance
    • Biometrics

Day 5: Privacy program governance

  • Organizational level
    • Creating a company vision
    • Establishing a privacy program
    • Structuring the privacy team
  • Developing the privacy program framework
    • Developing privacy policies, standards and guidelines
    • Defining privacy program activities
  • Implementing the privacy policy framework
    • Communicating the privacy framework to stakeholders
    • Ensuring alignment with laws and regulations
  • Metrics
    • Identifying intended audience for metrics
    • Defining reporting resources
    • Defining privacy metrics
    • Identifying systems/application collection points

Day 6: Privacy operational life cycle

  • Stage I: Assess (privacy operational life cycle)
    • Documenting current baseline
    • Processors and third-party vendor assessment
    • Physical assessments
    • Mergers, acquisitions and divestitures
    • Conducting analysis and assessments
  • Stage II: Protect (privacy operational life cycle)
    • Data life cycle
    • Information security practices
    • Privacy by design
  • Stage III: Sustain (privacy operational life cycle)
    • Measure
    • Align
    • Audit
    • Communicate
    • Monitor
  • Stage IV: Respond (privacy operational life cycle)
    • Information requests
    • Privacy incidents
CIPP/US, CIPT and CIPM Certification Training Bundle Course Wrap-Up

Whether you are looking for general information or have a specific question, we want to help.
Request More Information

    Time frame: