An Introduction To The Components Of A Privacy Program

Learn about the Main Components of a Privacy Program

Last updated 2022-01-10 | 0

- Learn the Main Components of a Privacy Program

What you'll learn

Learn the Main Components of a Privacy Program

* Requirements

* Interest in privacy
* Access to a computer

Description

This course is designed to provide a high level introduction to the components of a Privacy Program.

Since the enactment of the General Data Protection Regulation(GDPR), there have been GDPR inspired laws that have been passed such as the California Consumer Privacy Act(CCPA) and the Brazilian Data Protection Law(LGPD). Compliance with the privacy laws and regulations requires organizations to set up a Privacy Program and employ Privacy Program Managers to manage the program and the associated activities.

The privacy program will have specific activities that will need to be implemented to ensure that the program meets the following goals:

  • Ensure that an organization complies with the laws and regulations

  • Mitigation of Data Breach Risk

  • Identifying of Privacy Risks

  • Meeting expectations of consumers, employees, regulators, and business clients

What You Will Learn In this Course:

  • Role of a Privacy Program Manager

  • Role of Stakeholders

  • The Main Components of a Privacy Program

  • Why these Program Components are Important

Once you have completed the course, please take the quiz to test your knowledge and apply what you have learned.

Meet Your Instructor:

This Course is taught by Rita Mutyaba who has more than 5 years' experience working in the Privacy field including developing privacy processes, drafting privacy documentation, performing privacy impact assessments, identifying key performance indicators, and creating training materials. She has also earned the International Association of Privacy Professionals (IAPP) CIPP/E, CIPP/US, and CIPM Privacy Certifications.

Please note that the contents of this course do not constitute legal advice. If you need legal advice, please contact your Data Protection Officer or Data Privacy Counsel.

Who this course is for:

  • Students interested in privacy program management
  • Privacy Professionals interested in privacy program management
  • Anyone transitioning to the Data Privacy field
  • Anyone interested in privacy or data protection

Course content

1 sections • 46 lectures

Objectives of the Course Preview 00:46

Introduction Preview 00:30

Introduction to the components of a privacy program

Introduction- What is a Privacy Program Preview 01:22

Who Manages a Privacy Program? Preview 03:07

Who are the Main Stakeholders who Participate in the Privacy Program? Preview 02:58

Main Components of a Robust Privacy Program Preview 01:51

Section II: Program Governance Structure Preview 00:18

Privacy Program Structure Preview 02:40

Privacy Governance Models Preview 02:08

Privacy Governance Structure Preview 03:51

Privacy Program Governance Example Preview 01:19

Section III: Data Inventory, Data Flow Maps and Data classification Preview 00:22

What is a Data Inventory? Preview 02:33

Data Inventory Example Preview 04:16

Data Flow Maps Preview 01:13

Data Classification Preview 02:23

Section IV: Laws , Regulations, Standards Preview 00:29

Scoping Applicable Laws, Regulations, Standards Preview 04:25

Applicable Laws, Regulations, Standards: Example Preview 03:27

Applicable Laws, Regulations, Standards: Review of Example Preview 02:18

Section V: Privacy Policies Preview 00:25

Policies, Procedures and Guidelines Preview 05:13

Section VI Training and Awareness Preview 00:23

Training and Awareness: Advantages Preview 03:29

Section VII: International Data Transfers Preview 00:24

International Data Transfers: GDPR Requirements Preview 06:17

International Data Transfers: Derogations Preview 01:57

International Data Transfers: EU - US Privacy Shield Preview 02:16

Section VIII: Vendor Management Preview 00:15

Why is Vendor Management an Important Component of a Privacy Program? Preview 03:11

Section IX: Privacy Risk Assessments Preview 00:22

What are Privacy Risk Assessments? Preview 02:22

Privacy Impact Assessment (PIA)Process Preview 02:27

What is a Data Protection Impact Assessment? Preview 02:23

Requirements of a Data Protection Impact Assessment (DPIA) Preview 02:11

Section X: Incident Response Preview 00:14

Incident Response Plan Preview 03:21

Section XI: Complaints Handling Introduction Preview 00:12

Why Complaints Handling should be Part of a Privacy Program Preview 03:21

Section XII: Information Security Preview 00:12

Why Information Security is Important in a Privacy Program Preview 04:49

Section XIII: Monitoring and Audit Preview 00:16

Why Monitoring should be part of a Privacy Program Preview 04:58

Why Audits should be part of a Privacy Program Preview 02:34

Conclusion Preview 00:23

Components of a Privacy Program

Please take this quiz to apply the knowledge that you have learned.