BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Institute of Operational Privacy Design - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://instituteofprivacydesign.org
X-WR-CALDESC:Events for Institute of Operational Privacy Design
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250603
DTEND;VALUE=DATE:20250612
DTSTAMP:20260412T062845
CREATED:20250130T200909Z
LAST-MODIFIED:20250130T200909Z
UID:8585-1748908800-1749686399@instituteofprivacydesign.org
SUMMARY:Privacy in Technology (CIPT)
DESCRIPTION:LIVE ONLINE\nPrivacy in Technology (CIPT)\n3\, 4\, 10 & 11 June 0900-1300 CET\nWhat’s included\n\n\n\n\nInstruction by IAPP Faculty trainer\nDigital participant guide\nDigital copy of course textbook\n1 year IAPP membership\n\n  \nWhy You Should Take Privacy in Technology Training\nData protection regulations worldwide require privacy protections be built into products and services. IAPP Privacy in Technology training\, aligned with the ANSI/ISO-accredited CIPT certification program\, will provide you with the knowledge to recognize privacy threats and skills to apply technical strategies to mitigate privacy risk throughout the software and systems development lifecycles. \n  \nWho Should Train\nSoftware developers\, information security professionals\, data architects\, privacy engineers\, network and cloud engineers responsible for incorporating privacy controls into technology operations and product development. Training helps with career advancement and preparing for CIPT certification testing. \n  \nWhat You Will Learn\nPrivacy in Technology training teaches technology and data professionals how to understand and integrate strategies and techniques to minimize privacy threats. The curriculum includes privacy-by-design principles; implementing data- and process-oriented strategies to support privacy policies; and managing threats from AI\, location tracking\, etc. \n  \nCourse delivery\nThe course is delivered live online using MS Teams (or GoToWebinar) by an IAPP Faculty trainer. In order to minimise prolonged screen time the course is delivered over four half-days: \nDay 1 \nModule 1: Foundational principles\nModule 2: The role of technology in privacy (part 1) \nDay 2 \nModule 2: The role of technology in privacy (part 2)\nModule 3: Privacy threats and violations \nDay 3 \nModule 4: Technical measures and privacy-enhancing technologies\nModule 5: Privacy-by-design methodology \nDay 4 \nModule 6: Privacy engineering\nModule 7: Technology challenges for privacy \n  \nOther information\nThe Body of Knowledge for the CIPT course can be viewed and downloaded from here. \nBe aware that IAPP recommend approximately 30 hours of additional study of course materials and resources is required to adequately prepare for the exam. \nYou are encouraged to read the IAPP’s Certification Candidate Handbook for additional information about IAPP’s courses and preparation required to sit the exam. \nIf you take the CIPT exam within 3 months of the course and do not pass\, you are welcome to join a future course free of charge. \nPlease review the Online Training Policy for IAPP Courses that details information about cancellations. \n‍ \nProcessing and transfer of your personal data to the USA\nWhen you enrol on an IAPP course run by Purpose and Means\,  various personal data about you will be registered. For details on how your personal data is processed\, please view the Purpose and Means Privacy Notice. \nThe course you enrol on is offered in cooperation with the International Association of Privacy Professionals (IAPP)\, 75 Rochester Ave.\, Portsmouth\, NH 03801 USA. \nOnce you register for the course\, your name\, email address\, and existing IAPP membership status will be transferred to the IAPP in the USA. This is necessary  in order to complete the course registration\, and to allow you access to online training material\, register you as a member of the IAPP\, and make the required arrangements before a certification exam\, if relevant. \nThe transfer of your personal data to the IAPP in the USA is necessary for the performance of the training course contract between you and Purpose and Means\, and for the performance of the contract concluded in your interest between Purpose and Means and the IAPP.
URL:https://instituteofprivacydesign.org/event/privacy-in-technology-cipt-3/
LOCATION:Online
CATEGORIES:#privacytraining,#CIPT
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/purposeandmeans.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250401
DTEND;VALUE=DATE:20250410
DTSTAMP:20260412T062845
CREATED:20250130T200426Z
LAST-MODIFIED:20250130T200525Z
UID:8582-1743465600-1744243199@instituteofprivacydesign.org
SUMMARY:Privacy in Technology (CIPT)
DESCRIPTION:LIVE ONLINE\nPrivacy in Technology (CIPT)\n1\, 2\, 8 & 9 April 0900-1300 CET\nWhat’s included\n\n\n\n\nInstruction by IAPP Faculty trainer\nDigital participant guide\nDigital copy of course textbook\n1 year IAPP membership\n\n  \nWhy You Should Take Privacy in Technology Training\nData protection regulations worldwide require privacy protections be built into products and services. IAPP Privacy in Technology training\, aligned with the ANSI/ISO-accredited CIPT certification program\, will provide you with the knowledge to recognize privacy threats and skills to apply technical strategies to mitigate privacy risk throughout the software and systems development lifecycles. \n  \nWho Should Train\nSoftware developers\, information security professionals\, data architects\, privacy engineers\, network and cloud engineers responsible for incorporating privacy controls into technology operations and product development. Training helps with career advancement and preparing for CIPT certification testing. \n  \nWhat You Will Learn\nPrivacy in Technology training teaches technology and data professionals how to understand and integrate strategies and techniques to minimize privacy threats. The curriculum includes privacy-by-design principles; implementing data- and process-oriented strategies to support privacy policies; and managing threats from AI\, location tracking\, etc. \n  \nCourse delivery\nThe course is delivered live online using MS Teams (or GoToWebinar) by an IAPP Faculty trainer. In order to minimise prolonged screen time the course is delivered over four half-days: \nDay 1 \nModule 1: Foundational principles\nModule 2: The role of technology in privacy (part 1) \nDay 2 \nModule 2: The role of technology in privacy (part 2)\nModule 3: Privacy threats and violations \nDay 3 \nModule 4: Technical measures and privacy-enhancing technologies\nModule 5: Privacy-by-design methodology \nDay 4 \nModule 6: Privacy engineering\nModule 7: Technology challenges for privacy \n  \nOther information\nThe Body of Knowledge for the CIPT course can be viewed and downloaded from here. \nBe aware that IAPP recommend approximately 30 hours of additional study of course materials and resources is required to adequately prepare for the exam. \nYou are encouraged to read the IAPP’s Certification Candidate Handbook for additional information about IAPP’s courses and preparation required to sit the exam. \nIf you take the CIPT exam within 3 months of the course and do not pass\, you are welcome to join a future course free of charge. \nPlease review the Online Training Policy for IAPP Courses that details information about cancellations. \n‍ \nProcessing and transfer of your personal data to the USA\nWhen you enrol on an IAPP course run by Purpose and Means\,  various personal data about you will be registered. For details on how your personal data is processed\, please view the Purpose and Means Privacy Notice. \nThe course you enrol on is offered in cooperation with the International Association of Privacy Professionals (IAPP)\, 75 Rochester Ave.\, Portsmouth\, NH 03801 USA. \nOnce you register for the course\, your name\, email address\, and existing IAPP membership status will be transferred to the IAPP in the USA. This is necessary  in order to complete the course registration\, and to allow you access to online training material\, register you as a member of the IAPP\, and make the required arrangements before a certification exam\, if relevant. \nThe transfer of your personal data to the IAPP in the USA is necessary for the performance of the training course contract between you and Purpose and Means\, and for the performance of the contract concluded in your interest between Purpose and Means and the IAPP.
URL:https://instituteofprivacydesign.org/event/privacy-in-technology-cipt-2/
LOCATION:Online
CATEGORIES:#privacytraining,#CIPT
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/purposeandmeans.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250211
DTEND;VALUE=DATE:20250220
DTSTAMP:20260412T062845
CREATED:20250130T195715Z
LAST-MODIFIED:20250130T200202Z
UID:8576-1739232000-1740009599@instituteofprivacydesign.org
SUMMARY:Privacy in Technology (CIPT)
DESCRIPTION:LIVE ONLINE\nPrivacy in Technology (CIPT)\n11\, 12\, 18 & 19 February 0900-1300 CET\nWhat’s included\n\n\n\n\nInstruction by IAPP Faculty trainer\nDigital participant guide\nDigital copy of course textbook\n1 year IAPP membership\n\n  \nWhy You Should Take Privacy in Technology Training\nData protection regulations worldwide require privacy protections be built into products and services. IAPP Privacy in Technology training\, aligned with the ANSI/ISO-accredited CIPT certification program\, will provide you with the knowledge to recognize privacy threats and skills to apply technical strategies to mitigate privacy risk throughout the software and systems development lifecycles. \n  \nWho Should Train\nSoftware developers\, information security professionals\, data architects\, privacy engineers\, network and cloud engineers responsible for incorporating privacy controls into technology operations and product development. Training helps with career advancement and preparing for CIPT certification testing. \n  \nWhat You Will Learn\nPrivacy in Technology training teaches technology and data professionals how to understand and integrate strategies and techniques to minimize privacy threats. The curriculum includes privacy-by-design principles; implementing data- and process-oriented strategies to support privacy policies; and managing threats from AI\, location tracking\, etc. \n  \nCourse delivery\nThe course is delivered live online using MS Teams (or GoToWebinar) by an IAPP Faculty trainer. In order to minimise prolonged screen time the course is delivered over four half-days: \nDay 1 \nModule 1: Foundational principles\nModule 2: The role of technology in privacy (part 1) \nDay 2 \nModule 2: The role of technology in privacy (part 2)\nModule 3: Privacy threats and violations \nDay 3 \nModule 4: Technical measures and privacy-enhancing technologies\nModule 5: Privacy-by-design methodology \nDay 4 \nModule 6: Privacy engineering\nModule 7: Technology challenges for privacy \n  \nOther information\nThe Body of Knowledge for the CIPT course can be viewed and downloaded from here. \nBe aware that IAPP recommend approximately 30 hours of additional study of course materials and resources is required to adequately prepare for the exam. \nYou are encouraged to read the IAPP’s Certification Candidate Handbook for additional information about IAPP’s courses and preparation required to sit the exam. \nIf you take the CIPT exam within 3 months of the course and do not pass\, you are welcome to join a future course free of charge. \nPlease review the Online Training Policy for IAPP Courses that details information about cancellations. \n‍ \nProcessing and transfer of your personal data to the USA\nWhen you enrol on an IAPP course run by Purpose and Means\,  various personal data about you will be registered. For details on how your personal data is processed\, please view the Purpose and Means Privacy Notice. \nThe course you enrol on is offered in cooperation with the International Association of Privacy Professionals (IAPP)\, 75 Rochester Ave.\, Portsmouth\, NH 03801 USA. \nOnce you register for the course\, your name\, email address\, and existing IAPP membership status will be transferred to the IAPP in the USA. This is necessary  in order to complete the course registration\, and to allow you access to online training material\, register you as a member of the IAPP\, and make the required arrangements before a certification exam\, if relevant. \nThe transfer of your personal data to the IAPP in the USA is necessary for the performance of the training course contract between you and Purpose and Means\, and for the performance of the contract concluded in your interest between Purpose and Means and the IAPP.
URL:https://instituteofprivacydesign.org/event/privacy-in-technology-cipt/
LOCATION:Online
CATEGORIES:#privacytraining,#CIPT
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/purposeandmeans.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20241203
DTEND;VALUE=DATE:20241212
DTSTAMP:20260412T062845
CREATED:20240819T195714Z
LAST-MODIFIED:20240819T195714Z
UID:7068-1733184000-1733961599@instituteofprivacydesign.org
SUMMARY:Purpose and Means CIPT Live Training - Dec 3\, 4\, 10 &11
DESCRIPTION:Purpose and Means offers training with and without exam vouchers\, for a different price\nWith Exam €1695 https://www.purposeandmeans.io/product/iapp-cipt-live-training-full-package\nWithout Exam €1295 https://www.purposeandmeans.io/product/iapp-cipt-live-training-without-iapp-exam \nFor companies based in Denmark\, with a Danish VAT number\, we are required to charge 25% VAT (moms) on top of the prices listed. Please contact us in advance of placing your order so that a specific VAT invoice can be issued. \nThis VAT requirement does not apply to private individuals or companies outside of Denmark.\n‍ \nWhat’s included\n\nInstruction by IAPP Faculty trainer\nDigital participant guide\nDigital copy of course textbook\n1 year IAPP membership\n\n\n\nWhy You Should Take Privacy in Technology Training\nData privacy regulations worldwide require privacy protections be built into products and services. IAPP Privacy in Technology training\, aligned with the ANSI/ISO-accredited CIPT certification program\, will provide you with the knowledge to recognize privacy threats and skills to apply technical strategies to mitigate privacy risk throughout the software and systems development lifecycles. \n\n\nWho Should Train\nSoftware developers\, information security professionals\, data architects\, privacy engineers\, network and cloud engineers responsible for incorporating privacy controls into technology operations and product development. Training helps with career advancement and preparing for CIPT certification testing. \n\n\nWhat You Will Learn\nPrivacy in Technology training teaches technology and data professionals how to understand and integrate strategies and techniques to minimize privacy threats. The curriculum includes privacy-by-design principles; implementing data- and process-oriented strategies to support privacy policies; and managing threats from AI\, location tracking\, etc. \n\n\nCourse delivery\nThe course is delivered live online using MS Teams (or GoToWebinar) by an IAPP Faculty trainer. In order to minimise prolonged screen time the course is delivered over four half-days: \nDay 1 \nModule 1: Foundational principles\nModule 2: The role of technology in privacy (part 1) \nDay 2 \n‍Module 2: The role of technology in privacy (part 2)\nModule 3: Privacy threats and violations \nDay 3 \nModule 4: Technical measures and privacy-enhancing technologies\nModule 5: Privacy engineering \nDay 4 \nModule 6: Privacy-by-design methodology\nModule 7: Technology challenges for privacy \n\n\nOther information\nThe Body of Knowledge for the CIPT course can be viewed and downloaded from here. \nBe aware that IAPP recommend approximately 30 hours of additional study of course materials and resources is required to adequately prepare for the exam. \nYou are encouraged to read the IAPP’s Certification Candidate Handbook for additional information about IAPP’s courses and preparation required to sit the exam. \nIf you take the CIPT exam within 3 months of the course and do not pass\, you are welcome to join a future course free of charge. \nPlease review the Online Training Policy for IAPP Courses that details information about cancellations. \n‍ \nProcessing and transfer of your personal data to the USA\nWhen you enrol on an IAPP course run by Purpose and Means\,  various personal data about you will be registered. For details on how your personal data is processed\, please view the Purpose and Means Privacy Notice. \nThe course you enroll on is offered in cooperation with the International Association of Privacy Professionals (IAPP)\, 75 Rochester Ave.\, Portsmouth\, NH 03801 USA. \nOnce you register for the course\, your name\, email address\, and existing IAPP membership status will be transferred to the IAPP in the USA. This is necessary  in order to complete the course registration\, and to allow you access to online training material\, register you as a member of the IAPP\, and make the required arrangements before a certification exam\, if relevant. \nThe transfer of your personal data to the IAPP in the USA is necessary for the performance of the training course contract between you and Purpose and Means\, and for the performance of the contract concluded in your interest between Purpose and Means and the IAPP.
URL:https://instituteofprivacydesign.org/event/purpose-and-means-cipt-live-training-dec-3-4-10-11/
LOCATION:Online
CATEGORIES:#CIPT
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/purposeandmeans.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240806
DTEND;VALUE=DATE:20240815
DTSTAMP:20260412T062845
CREATED:20240123T220116Z
LAST-MODIFIED:20240730T224409Z
UID:5560-1722902400-1723679999@instituteofprivacydesign.org
SUMMARY:Purpose and Means CIPT Live Training - Aug 6\, 7\, 13 & 14
DESCRIPTION:Purpose and Means offers training with and without exam vouchers\, for a different price\nWith Exam €1695 https://www.purposeandmeans.io/product/iapp-cipt-live-training-full-package\nWithout Exam €1295 https://www.purposeandmeans.io/product/iapp-cipt-live-training-without-iapp-exam \nFor companies based in Denmark\, with a Danish VAT number\, we are required to charge 25% VAT (moms) on top of the prices listed. Please contact us in advance of placing your order so that a specific VAT invoice can be issued. \nThis VAT requirement does not apply to private individuals or companies outside of Denmark.\n‍ \n\n\nWhat’s included\n\nInstruction by IAPP Faculty trainer\nDigital participant guide\nDigital copy of course textbook\n1 year IAPP membership\n\n\nWhy You Should Take Privacy in Technology Training\nData privacy regulations worldwide require privacy protections be built into products and services. IAPP Privacy in Technology training\, aligned with the ANSI/ISO-accredited CIPT certification program\, will provide you with the knowledge to recognize privacy threats and skills to apply technical strategies to mitigate privacy risk throughout the software and systems development lifecycles. \n\nWho Should Train\nSoftware developers\, information security professionals\, data architects\, privacy engineers\, network and cloud engineers responsible for incorporating privacy controls into technology operations and product development. Training helps with career advancement and preparing for CIPT certification testing. \n\nWhat You Will Learn\nPrivacy in Technology training teaches technology and data professionals how to understand and integrate strategies and techniques to minimize privacy threats. The curriculum includes privacy-by-design principles; implementing data- and process-oriented strategies to support privacy policies; and managing threats from AI\, location tracking\, etc. \n\nCourse delivery\nThe course is delivered live online using MS Teams (or GoToWebinar) by an IAPP Faculty trainer. In order to minimise prolonged screen time the course is delivered over four half-days: \nDay 1 \nModule 1: Foundational principles\nModule 2: The role of technology in privacy (part 1) \nDay 2 \n‍Module 2: The role of technology in privacy (part 2)\nModule 3: Privacy threats and violations \nDay 3 \nModule 4: Technical measures and privacy-enhancing technologies\nModule 5: Privacy engineering \nDay 4 \nModule 6: Privacy-by-design methodology\nModule 7: Technology challenges for privacy \n\nOther information\nThe Body of Knowledge for the CIPT course can be viewed and downloaded from here. \nBe aware that IAPP recommend approximately 30 hours of additional study of course materials and resources is required to adequately prepare for the exam. \nYou are encouraged to read the IAPP’s Certification Candidate Handbook for additional information about IAPP’s courses and preparation required to sit the exam. \nIf you take the CIPT exam within 3 months of the course and do not pass\, you are welcome to join a future course free of charge. \nPlease review the Online Training Policy for IAPP Courses that details information about cancellations. \n‍ \nProcessing and transfer of your personal data to the USA\nWhen you enrol on an IAPP course run by Purpose and Means\,  various personal data about you will be registered. For details on how your personal data is processed\, please view the Purpose and Means Privacy Notice. \nThe course you enroll on is offered in cooperation with the International Association of Privacy Professionals (IAPP)\, 75 Rochester Ave.\, Portsmouth\, NH 03801 USA. \nOnce you register for the course\, your name\, email address\, and existing IAPP membership status will be transferred to the IAPP in the USA. This is necessary  in order to complete the course registration\, and to allow you access to online training material\, register you as a member of the IAPP\, and make the required arrangements before a certification exam\, if relevant. \nThe transfer of your personal data to the IAPP in the USA is necessary for the performance of the training course contract between you and Purpose and Means\, and for the performance of the contract concluded in your interest between Purpose and Means and the IAPP.
URL:https://instituteofprivacydesign.org/event/iapp-cipt-virtual-jun-3-4-10-11/
LOCATION:Virtual
CATEGORIES:#privacytraining,#CIPT
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/purposeandmeans.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240613T130000
DTEND;TZID=America/New_York:20240613T150000
DTSTAMP:20260412T062845
CREATED:20240222T141828Z
LAST-MODIFIED:20240410T194918Z
UID:6238-1718283600-1718290800@instituteofprivacydesign.org
SUMMARY:Certification Study Group - Privacy In Technology (CIPT)
DESCRIPTION:There are many ways to prepare for taking a certification exam from the International Association of Privacy Professionals. No matter how you study\, there always seem to be some questions that remain. Privacy Ref can help. \nCome prepared to this 2-hour session with questions or areas related to the exam that you want to review. We will be making use of the exam blueprint and body of knowledge provided by the IAPP to focus our discussion.
URL:https://instituteofprivacydesign.org/event/certification-study-group-privacy-in-technology-cipt-2/
LOCATION:Online
CATEGORIES:#CIPT,#certificationstudygroup
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240322
DTEND;VALUE=DATE:20240324
DTSTAMP:20260412T062845
CREATED:20240122T210222Z
LAST-MODIFIED:20240409T185538Z
UID:5773-1711065600-1711238399@instituteofprivacydesign.org
SUMMARY:Privacy SWAN Virtual Live CIPT Training
DESCRIPTION:PrivacySWAN is an Official Training Partner of the International Association of Privacy Professionals (IAPP) which is the largest association of privacy professionals in the world. The CIPT is the first and original certification in Privacy Technology Management. Along with the training program\, the IAPP also provides an ANSI/ISO-accredited certification. Come learn how to develop and manage a global privacy and data protection program today. \nThis class is offered on Friday and Saturday for those busy professionals who can only afford to take off one day of the work week. This instructor-led training is conducted over two days. Privacy in Technology training is the how-to course on privacy and data protection practices in the development\, engineering\, deployment\, and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. It prepares you for the tough challenges you will encounter as you talk to your technical teams about incorporating privacy into their design. You will be provided with real-life examples and templates that help deal with the ever-changing privacy landscape. These news skills will advance your career. In addition to the highly sought-after training\, the following benefits are provided by Privacy SWAN: \n\nIAPP Strategic Privacy by Design Textbook (only for the first four students who register)\nIAPP Introduction to Privacy for Technology Professionals Textbook (Digital only – $75 value)\nParticipant training materials (only available with training)\nExam Voucher – if purchased ($550 value)\nOne year of IAPP Membership or renewal of existing Membership ($295 value)\nPrivacy SWAN custom training materials\n\n  \nWho should attend\nTechnology\, InfoSec\, and Engineering professionals with a primary focus on securing the integrity\, confidentiality\, and availability of corporate data. Anyone who can understand highly complex interconnected technologies and who needs to incorporate a robust privacy program to ensure compliance with global data protection regulations. \n\nChief Information Security Officers\nSecurity Managers\nInformation Managers\nProduct Managers\nAuditors\nContract Managers\nCompliance Officers\nPrivacy Managers\nChief Privacy Officers\nData Protection Officers\n\n  \nWhat you will learn\nHow to protect personal data by applying critical privacy concepts and practices that impact technology and use technology to design data privacy into products and services and establish privacy practices for data security and control\, such as data minimization\, perturbing the data\, and de-identification techniques. Factor privacy into data classification and emerging technology\, such as cloud computing\, facial recognition\, and surveillance. Communicate and collaborate on privacy issues with management\, development\, marketing\, and legal departments. Understand consumer privacy expectations and best practices\, while proactively addressing privacy issues with the Internet of Things. \n\nFoundational Principles in Technology Summarizes the foundational elements for embedding privacy in technology through privacy by design and value-sensitive design; reviews the data life cycle and common privacy risk models and frameworks\nThe Tech Pro’s role in privacy Reviews the fundamentals of privacy as they relate to the privacy technologist; describes the privacy technologist’s role in ensuring compliance with privacy requirements and meeting stakeholder privacy expectations; explores the relationship between privacy and security\nNeutralizing Threats and Enhancing Privacy Identify inherent risks throughout the stages of the data life cycle and explore how software security helps mitigate privacy threats; examine the impacts that behavioral advertising\, cyberbullying\, and social engineering have on privacy within the technological environment\nPrivacy Engineering Explores the role of privacy engineering within an organization\, including the objectives of privacy engineering\, privacy design patterns\, and software privacy risks\nTechnological Challenges for Privacy Examine the unique challenges that come from online privacy issues\, including automated decision making\, tracking and surveillance technologies\, anthropomorphism\, ubiquitous computing\, and mobile social computing\nOfficial IAPP CIPT Get Certified Documents\n\n 
URL:https://instituteofprivacydesign.org/event/privacy-swan-virtual-live-cipt-training-2/
LOCATION:Virtual
CATEGORIES:#privacytraining,#CIPT
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/SWANlogo2023-transp-3.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240307T130000
DTEND;TZID=America/New_York:20240307T150000
DTSTAMP:20260412T062845
CREATED:20240221T210416Z
LAST-MODIFIED:20240304T171924Z
UID:6221-1709816400-1709823600@instituteofprivacydesign.org
SUMMARY:Certification Study Group - Privacy In Technology (CIPT)
DESCRIPTION:There are many ways to prepare for taking a certification exam from the International Association of Privacy Professionals. No matter how you study\, there always seem to be some questions that remain. Privacy Ref can help. \nCome prepared to this 2-hour session with questions or areas related to the exam that you want to review. We will be making use of the exam blueprint and body of knowledge provided by the IAPP to focus our discussion.
URL:https://instituteofprivacydesign.org/event/certification-study-group-privacy-in-technology-cipt/
LOCATION:Online
CATEGORIES:#CIPT,#certificationstudygroup
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240229
DTEND;VALUE=DATE:20240302
DTSTAMP:20260412T062845
CREATED:20240122T210050Z
LAST-MODIFIED:20240409T185519Z
UID:5774-1709164800-1709337599@instituteofprivacydesign.org
SUMMARY:Privacy SWAN Virtual Live CIPT Training
DESCRIPTION:PrivacySWAN is an Official Training Partner of the International Association of Privacy Professionals (IAPP) which is the largest association of privacy professionals in the world. The CIPT is the first and original certification in Privacy Technology Management. Along with the training program\, the IAPP also provides an ANSI/ISO-accredited certification. Come learn how to develop and manage a global privacy and data protection program today. \nThis instructor-led training is conducted over two days. Privacy in Technology training is the how-to course on privacy and data protection practices in the development\, engineering\, deployment\, and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. It prepares you for the tough challenges you will encounter as you talk to your technical teams about incorporating privacy into their design. You will be provided with real-life examples and templates that help deal with the ever-changing privacy landscape. These news skills will advance your career. In addition to the highly sought-after training\, the following benefits are provided by Privacy SWAN: \n\nIAPP Strategic Privacy by Design Textbook (only for the first four students who register)\nIAPP Introduction to Privacy for Technology Professionals Textbook (Digital only – $75 value)\nParticipant training materials (only available with training)\nExam Voucher – if purchased ($550 value)\nOne year of IAPP Membership or renewal of existing Membership ($295 value)\nPrivacy SWAN custom training materials\n\n  \nWho should attend\nTechnology\, InfoSec\, and Engineering professionals with a primary focus on securing the integrity\, confidentiality\, and availability of corporate data. Anyone who can understand highly complex interconnected technologies and who needs to incorporate a robust privacy program to ensure compliance with global data protection regulations. \n\nChief Information Security Officers\nSecurity Managers\nInformation Managers\nProduct Managers\nAuditors\nContract Managers\nCompliance Officers\nPrivacy Managers\nChief Privacy Officers\nData Protection Officers\n\n  \nWhat you will learn\nHow to protect personal data by applying critical privacy concepts and practices that impact technology and use technology to design data privacy into products and services and establish privacy practices for data security and control\, such as data minimization\, perturbing the data\, and de-identification techniques. Factor privacy into data classification and emerging technology\, such as cloud computing\, facial recognition\, and surveillance. Communicate and collaborate on privacy issues with management\, development\, marketing\, and legal departments. Understand consumer privacy expectations and best practices\, while proactively addressing privacy issues with the Internet of Things. \n\nFoundational Principles in Technology Summarizes the foundational elements for embedding privacy in technology through privacy by design and value-sensitive design; reviews the data life cycle and common privacy risk models and frameworks\nThe Tech Pro’s role in privacy Reviews the fundamentals of privacy as they relate to the privacy technologist; describes the privacy technologist’s role in ensuring compliance with privacy requirements and meeting stakeholder privacy expectations; explores the relationship between privacy and security\nNeutralizing Threats and Enhancing Privacy Identify inherent risks throughout the stages of the data life cycle and explore how software security helps mitigate privacy threats; examine the impacts that behavioral advertising\, cyberbullying\, and social engineering have on privacy within the technological environment\nPrivacy Engineering Explores the role of privacy engineering within an organization\, including the objectives of privacy engineering\, privacy design patterns\, and software privacy risks\nTechnological Challenges for Privacy Examine the unique challenges that come from online privacy issues\, including automated decision making\, tracking and surveillance technologies\, anthropomorphism\, ubiquitous computing\, and mobile social computing\nOfficial IAPP CIPT Get Certified Documents\n\n 
URL:https://instituteofprivacydesign.org/event/privacy-swan-virtual-live-cipt-training/
LOCATION:Virtual
CATEGORIES:#privacytraining,#CIPT
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/SWANlogo2023-transp-3.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240206
DTEND;VALUE=DATE:20240208
DTSTAMP:20260412T062845
CREATED:20240119T101607Z
LAST-MODIFIED:20240123T212859Z
UID:5520-1707177600-1707350399@instituteofprivacydesign.org
SUMMARY:Symptai In Person CIPT Training (Kingston\, Jamaica)
DESCRIPTION:The CIPT program was developed by the International Association of Privacy Professionals (IAPP)\, which is the world’s largest comprehensive global information privacy community and resource. The CIPT certification also holds accreditation under ISO 17024: 2012. \nThese instructor-led training sessions are beneficial for persons who plan to certify or just want to deepen your privacy knowledge. And\, in the ever-changing privacy environment\, as new legislation such as the GDPR and the CCPA comes along\, you will be fully prepared. \n  \n\nWhat will you learn\n\nModule 1: Foundational principles of privacy in technology\nModule 2: The role of the technology professional in privacy\nModule 3: Privacy threats and violations\nModule 4: Technical measures and privacy-enhancing technologies\nModule 5: Privacy engineering\nModule 6: Privacy-by-design methodology\nModule 7: Technology challenges for privacy\n\n  \n\n\nWho should attend?\n\nData Protection Officers\nData Protection Managers\nAuditors\nLegal Compliance Officers\nSecurity Manager\nInformation Managers\nAnyone involved with data protection processes and programs\n\n  \n\n\nWhat comes with registration?\nOnce registered for this course\, participants will also be registered as an official member of the IAPP and receive official members access to the training/course material for the CIPM exam and an exam voucher in order to register for the exam. This course will prepare persons to sit the CIPM exam and have a comprehensive understanding of privacy in an organization and how to manage it. \n  \n\nWhy organizations should implement training?\n\nComply with GDPR requirements\nAvoid penalties up to 20 million euros (25 million USD) or 4% of global revenues\nImprove the way your entire organization handles data\nReduce risk of a data breach\nBuild privacy policies to make your organization more cost-effective\nDemonstrate accountability and due diligence\nFoster customer confidence
URL:https://instituteofprivacydesign.org/event/iapp-cipt-kingston-jamaica-feb-6-7/
LOCATION:Symptai Consulting Limited\, 58 Half Way Tree Road\, Kingston\, Jamaica
CATEGORIES:#privacytraining,#CIPT
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/logo.png
END:VEVENT
END:VCALENDAR