BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Institute of Operational Privacy Design - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Institute of Operational Privacy Design
X-ORIGINAL-URL:https://instituteofprivacydesign.org
X-WR-CALDESC:Events for Institute of Operational Privacy Design
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240228T090000
DTEND;TZID=America/New_York:20240229T160000
DTSTAMP:20260503T084121
CREATED:20240212T233127Z
LAST-MODIFIED:20240216T221215Z
UID:6039-1709110800-1709222400@instituteofprivacydesign.org
SUMMARY:European Data Protection (CIPP/E)
DESCRIPTION:The European Data Protection (CIPP/E) encompasses pan-European and national data protection laws\, key data protection terminology and practical concepts concerning the protection of personal data and trans-border data flows. The global gold standard in European data protection certification. \nThe content of the courses is integral to broadening your knowledge\, educating your privacy team\, and put you on the path to obtaining your privacy certifications. \n  \nCourse outline: \n\nModule 1: Data protection laws\nModule 2: Personal data\nModule 3: Controllers and processors\nModule 4: Processing personal data\nModule 5: Data subject rights\nModule 6: Information provision obligations\nModule 7: International data transfers\nModule 8: Compliance considerations\nModule 9: Security of processing\nModule 10: Accountability\nModule 11: Supervision and enforcement\n\n  \n\n  \n*Certification Study Group voucher must be used within three months of taking the course. \n**The IAPP exam must be taken within three months of the release of the exam. Refresher course must be taken within three months of completing the IAPP exam. \n*** 1 Year Membership valid with first course taken with Privacy Ref \n  \n*** Links to Privacy Ref Include Web Tracking***
URL:https://instituteofprivacydesign.org/event/european-data-protection-cipp-e-utm_sourceiopdutm_mediumwebsiteutm_campaigniopdq1-2024/
LOCATION:Hybrid (Online & In-Person)
CATEGORIES:#privacytraining,#CIPP/E
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240229
DTEND;VALUE=DATE:20240302
DTSTAMP:20260503T084121
CREATED:20240122T210050Z
LAST-MODIFIED:20240409T185519Z
UID:5774-1709164800-1709337599@instituteofprivacydesign.org
SUMMARY:Privacy SWAN Virtual Live CIPT Training
DESCRIPTION:PrivacySWAN is an Official Training Partner of the International Association of Privacy Professionals (IAPP) which is the largest association of privacy professionals in the world. The CIPT is the first and original certification in Privacy Technology Management. Along with the training program\, the IAPP also provides an ANSI/ISO-accredited certification. Come learn how to develop and manage a global privacy and data protection program today. \nThis instructor-led training is conducted over two days. Privacy in Technology training is the how-to course on privacy and data protection practices in the development\, engineering\, deployment\, and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. It prepares you for the tough challenges you will encounter as you talk to your technical teams about incorporating privacy into their design. You will be provided with real-life examples and templates that help deal with the ever-changing privacy landscape. These news skills will advance your career. In addition to the highly sought-after training\, the following benefits are provided by Privacy SWAN: \n\nIAPP Strategic Privacy by Design Textbook (only for the first four students who register)\nIAPP Introduction to Privacy for Technology Professionals Textbook (Digital only – $75 value)\nParticipant training materials (only available with training)\nExam Voucher – if purchased ($550 value)\nOne year of IAPP Membership or renewal of existing Membership ($295 value)\nPrivacy SWAN custom training materials\n\n  \nWho should attend\nTechnology\, InfoSec\, and Engineering professionals with a primary focus on securing the integrity\, confidentiality\, and availability of corporate data. Anyone who can understand highly complex interconnected technologies and who needs to incorporate a robust privacy program to ensure compliance with global data protection regulations. \n\nChief Information Security Officers\nSecurity Managers\nInformation Managers\nProduct Managers\nAuditors\nContract Managers\nCompliance Officers\nPrivacy Managers\nChief Privacy Officers\nData Protection Officers\n\n  \nWhat you will learn\nHow to protect personal data by applying critical privacy concepts and practices that impact technology and use technology to design data privacy into products and services and establish privacy practices for data security and control\, such as data minimization\, perturbing the data\, and de-identification techniques. Factor privacy into data classification and emerging technology\, such as cloud computing\, facial recognition\, and surveillance. Communicate and collaborate on privacy issues with management\, development\, marketing\, and legal departments. Understand consumer privacy expectations and best practices\, while proactively addressing privacy issues with the Internet of Things. \n\nFoundational Principles in Technology Summarizes the foundational elements for embedding privacy in technology through privacy by design and value-sensitive design; reviews the data life cycle and common privacy risk models and frameworks\nThe Tech Pro’s role in privacy Reviews the fundamentals of privacy as they relate to the privacy technologist; describes the privacy technologist’s role in ensuring compliance with privacy requirements and meeting stakeholder privacy expectations; explores the relationship between privacy and security\nNeutralizing Threats and Enhancing Privacy Identify inherent risks throughout the stages of the data life cycle and explore how software security helps mitigate privacy threats; examine the impacts that behavioral advertising\, cyberbullying\, and social engineering have on privacy within the technological environment\nPrivacy Engineering Explores the role of privacy engineering within an organization\, including the objectives of privacy engineering\, privacy design patterns\, and software privacy risks\nTechnological Challenges for Privacy Examine the unique challenges that come from online privacy issues\, including automated decision making\, tracking and surveillance technologies\, anthropomorphism\, ubiquitous computing\, and mobile social computing\nOfficial IAPP CIPT Get Certified Documents\n\n 
URL:https://instituteofprivacydesign.org/event/privacy-swan-virtual-live-cipt-training/
LOCATION:Virtual
CATEGORIES:#privacytraining,#CIPT
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/SWANlogo2023-transp-3.png
END:VEVENT
END:VCALENDAR