Certified Information Privacy Technologist (CIPT)
About This Course
At the end of the 3-day course, participants will be able to:
• Recognise foundational elements for embedding privacy in technology
• Describe the fundamentals of privacy as they relate to the privacy technologist
• Identify the risks to privacy that are inherent throughout the data life cycle and explain how software security helps to mitigate privacy threats
• Outline how technical measures and privacy-enhancing technologies may be used to enhance privacy throughout all steps of the data life-cycle
• Explain the role of privacy engineering within an organisation
• Describe the process and methodology of the privacy-by-design model
• Examine the unique challenges that come from online privacy issues
What You'll Learn
The IAPP Privacy in Technology training - Certified Information Privacy Technologist (CIPT) - provides participants with the knowledge to recognise privacy threats and skills to apply technical strategies to mitigate privacy risk throughout the software and systems development lifecycles.
The CIPT certification covers the following body of knowledge:
• Foundational Principles
(a) Privacy Risk Models and Frameworks
(b) Privacy by Design Foundational Principles
(c) Value Sensitive Design
(d) The Data Life Cycle
• The Role of IT in Privacy
(a) Fundamentals of privacy-related IT
(b) Information Security
(c) The privacy responsibilities of the IT professional
• Privacy Threats and Violations
(a) During Data Collection
(b) During Use
(c) During Dissemination
(d) Intrusion, Decisional Interference and Self Representation
(e) Software Security
• Technical Measures and Privacy Enhancing Technologies
(a) Data Oriented Strategies
(b) Techniques
(c) Process Oriented Strategies
• Privacy Engineering
(a) The Privacy Engineering role in the organisation
(b) Privacy Engineering Objectives
(c) Privacy Design Patterns
(d) Privacy Risks in Software
• Privacy by Design Methodology
(a) The Privacy by Design Process
(b) Ongoing Vigilance
• Technology Challenges for Privacy
(a) Automated decision making
(b) Tracking and Surveillance
(c) Anthropomorphism
(d) Ubiquitous computing
(e) Mobile Social Computing
Entry Requirements
Participants should preferably be a degree holder with at least 2 years of working experience.