BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Institute of Operational Privacy Design - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Institute of Operational Privacy Design
X-ORIGINAL-URL:https://instituteofprivacydesign.org
X-WR-CALDESC:Events for Institute of Operational Privacy Design
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Europe/Paris
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20230326T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20231029T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20240331T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20241027T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20250330T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20251026T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Denver
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20230312T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20231105T080000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20240310T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20241103T080000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20250309T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20251102T080000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Halifax
BEGIN:DAYLIGHT
TZOFFSETFROM:-0400
TZOFFSETTO:-0300
TZNAME:ADT
DTSTART:20230312T060000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0300
TZOFFSETTO:-0400
TZNAME:AST
DTSTART:20231105T050000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0400
TZOFFSETTO:-0300
TZNAME:ADT
DTSTART:20240310T060000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0300
TZOFFSETTO:-0400
TZNAME:AST
DTSTART:20241103T050000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0400
TZOFFSETTO:-0300
TZNAME:ADT
DTSTART:20250309T060000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0300
TZOFFSETTO:-0400
TZNAME:AST
DTSTART:20251102T050000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Toronto
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Europe/Paris:20240408T090000
DTEND;TZID=Europe/Paris:20240411T180000
DTSTAMP:20260406T120222
CREATED:20240308T203510Z
LAST-MODIFIED:20240322T063814Z
UID:6341-1712566800-1712858400@instituteofprivacydesign.org
SUMMARY:Bello Consulting IAPP Certified AIGP Training
DESCRIPTION:IAPP Certified Artificial Intelligence Governance Professional Training\nThe field of AI is growing exponentially and in response the IAPP has developed the Artificial Intelligence Governance Professional certification. Establish your capacity to perform ethical\, safe\, trustworthy AI governance by earning the AIGP designation. \nBecome cornerstone of your organization privacy AI governance program. Certify and boost your carrier. \nThe AIGP Body of Knowledge outlines all the concepts and topics that you need to know to become certified. Learn more on this link. \nTraining and certification program\n1) Training program registration (click here to register) \n2) Kick off meeting \n> Agree on schedule \n> Develop personalized study plan \n> Agree on training format (time zone\, 2-3-4 days\, back2back or consecutive days/weeks) \n3) Pre-training material self-study including mentoring on per needed basis following personalized study plan \n4) In-person or Online training based on schedule and training format (proposed schedule is illustrative) \n5) Post-training exam preparation and mentoring (IAPP propose 30 hrs\, our experience is 2-4 weeks) We do not recommend to exceed 8 weeks after the training. IAPP exam voucher deadline is 12 month after purchase. \nTraining package price is covering:\n1) IAPP membership for 12 month (if you already have a valid IAPP membership it will be extended after expire date) \n2) All IAPP benefits you have as within professional membership including the access to resources and libraries \n3) digital editions of AIGP training materials provided by IAPP \n4) additional resources for training and exam preparation provided by Bello Consulting (including 95 sample exam questions) \n5) AIGP exam voucher valid for 12 month after purchase \n6) training in-person or online according to agreed format \n7) pre and post training mentoring \nAbout your trainer\nTraining is run by William Bello FIP CIPP/E CIPP/US CIPM CIPT ITIL and AIGP authorized trainer. William has more then 40yrs of experience at all levels in IT and business architecture and 7 years of dedicated privacy / data protection practice as a DPO and privacy professional trainer. William is member of EDPB expert team. Bello Consulting is IAPP Official training partner. \nWhy you should opt-in for training with us\nWilliam will prepare you for exam in a unique\, efficient and very effective way. It is experience that will not only help you to pass the exam but it will also provide you with guidance that will help you in your everyday work. AI is changing the world we know and AI governance is the future of this world. The unprecedented expertise and knowledge you will receive is going to enable change of your carrier to new heights. We are supporting you all the way until you successfully earn the AIGP certification – and beyond – if you need advice and help. \nImportant notice\nListed price is limited promotional price. \nPrice is without VAT. Individuals have to add 25% VAT. Companies are VAT reverse charge. Payment terms are flexible and individuals sponsoring is available. Ask for details. \nTRAINING IS SCHEDULLED FOR Monday – Thursday for two groups in GLOBAL MAIN TIME ZONES: 9am – 1pm CET (GMT+1) and 9am – 1 pm EDT (EST) \nHow to opt-in for training\nOption 1. Visit the CertShop here and purchase the training package \nOption 2. Register here (recomended) and we will contact you to personalise your training schedule and payment
URL:https://instituteofprivacydesign.org/event/aigp-bello-consulting/
LOCATION:Online
CATEGORIES:#privacytraining,#AIGP
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/03/65ead9afb289c-3.png
ORGANIZER;CN="Bello Consulting":MAILTO:iapp@bello.hr
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240415T090000
DTEND;TZID=America/New_York:20240416T160000
DTSTAMP:20260406T120222
CREATED:20240213T224732Z
LAST-MODIFIED:20240304T172403Z
UID:6067-1713171600-1713283200@instituteofprivacydesign.org
SUMMARY:Privacy Program Management (CIPM)
DESCRIPTION:Privacy Program Management teaches you how to create and manage a privacy program. It gives you the tools to answer day-to-day questions about privacy operations. The CIPM is the world’s first and only certification in privacy program management. When you earn a CIPM\, it shows that you know how to make a privacy program work for your organization. \nThe content of the courses is integral to broadening your knowledge\, educating your privacy team\, and put you on the path to obtaining your privacy certifications. \n  \nCourse outline: \n\nModule 1: Introduction to privacy program management\nModule 2: Privacy  Governance\nModule 3: Applicable laws and regulations\nModule 4: Data assessments\nModule 5: Policies\nModule 6: Data subject rights\nModule 7: Training and awareness\nModule 8: Protecting personal information\nModule 9: Data breach incident plans\nModule 10: Monitoring and auditing program performance\n\n  \n\n  \n*Certification Study Group voucher must be used within three months of taking the course. \n**The IAPP exam must be taken within three months of the release of the exam. Refresher course must be taken within three months of completing the IAPP exam. \n*** 1 Year Membership valid with first course taken with Privacy Ref \n  \n*** Links to Privacy Ref Include Web Tracking***
URL:https://instituteofprivacydesign.org/event/privacy-program-management-cipm-utm_sourceiopdutm_mediumwebsiteutm_campaigniopdq1-2024-2/
LOCATION:Hybrid (Online & In-Person)
CATEGORIES:#privacytraining,#CIPM
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240418T130000
DTEND;TZID=America/New_York:20240418T150000
DTSTAMP:20260406T120222
CREATED:20240222T140735Z
LAST-MODIFIED:20240410T194611Z
UID:6229-1713445200-1713452400@instituteofprivacydesign.org
SUMMARY:Certification Study Group - Artificial Intelligence Governance (AIGP)
DESCRIPTION:There are many ways to prepare for taking a certification exam from the International Association of Privacy Professionals. No matter how you study\, there always seem to be some questions that remain. Privacy Ref can help. \nCome prepared to this 2-hour session with questions or areas related to the exam that you want to review. We will be making use of the exam blueprint and body of knowledge provided by the IAPP to focus our discussion.
URL:https://instituteofprivacydesign.org/event/certification-study-group-artificial-intelligence-governance-aigp/
LOCATION:Online
CATEGORIES:#AIGP,#certificationstudygroup
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20240424T110000
DTEND;TZID=America/Denver:20240424T120000
DTSTAMP:20260406T120222
CREATED:20240404T185739Z
LAST-MODIFIED:20240409T190110Z
UID:6472-1713956400-1713960000@instituteofprivacydesign.org
SUMMARY:Privacy Threat and Risk Modeling in 2024 | IAPP Sacramento KnowledgeNet
DESCRIPTION:Virtual Sacramento KnowledgeNet: 24 April 2024\nThis meeting will be held virtually with no in-person component and will not be recorded. Instructions on how to view this webinar will be sent to registrants upon registration and 1-2 days prior to the meeting. If registration is closed or you have any questions\, please email knowledgenet@iapp.org. Please note that recording by participants is strictly prohibited and anyone who attempts to record the event will be asked to stop and removed upon noncompliance.\n  \n\n\n\n\n\nTopic: \nPrivacy Threat and Risk Modeling in 2024 \nThreat modeling is all the rage in the security field\, but what is threat modeling in privacy? Join Jason Cronk\, President of the Institute of Operational Privacy Design (IOPD)\, as he discusses the nascent field of privacy threat and risk modeling. In this talk\, he’ll discuss privacy risk as described in his IAPP book Strategic Privacy by Design\, the new MITRE Corporation’s PANOPTIC Threat Model and the risk model used in the forthcoming IOPD standard for privacy by design. \n  \nSpeaker: \nJason Cronk\, CIPP/US\, CIPM\, CIPT\, FIP\, Privacy Engineer\, Author\, Enterprivacy Consulting Group; President\, Institute of Operational Privacy Design \n  \nTime: \n11:00-12:00 PDT \n  \nThank you to our local KnowledgeNet Chapter Chairs: \nLisa Ann Hall\, CIPP/US\, Senior Privacy Analyst\, Cloud Software Group \nSherrie Osborne\, CIPP/E\, CIPM\, Senior Director\, Privacy Compliance Officer\, LendingClub \nSteven Ward\, Data Privacy and Security Fellow\, R Street Institute \nSpecial thank you to Young Privacy Professional volunteer\, Susana Leone\, CIPP/E\, Program Manager\, Data Protection Attorney\, for helping to support the chapter. \n  \nEligible CPE Credits:  \nCIPP/A\, CIPP/C\, CIPP/E\, CIPP/US\, CIPM\, and CIPT. \n1.0 CPE \nIf you have certification questions\, please read our cpe policy or e-mail cpe@iapp.org. Credit will be awarded two weeks after date of event.
URL:https://instituteofprivacydesign.org/event/privacy-threat-and-risk-modeling-in-2024-iapp-sacramento-knowledgenet/
LOCATION:Virtual
CATEGORIES:Speaking Engagements,Webinar
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/04/unnamed-2.png
ORGANIZER;CN="Enterprivacy Consulting Group":MAILTO:rjc@enterprivacy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Halifax:20240424T150000
DTEND;TZID=America/Halifax:20240424T160000
DTSTAMP:20260406T120222
CREATED:20240401T194352Z
LAST-MODIFIED:20240401T194352Z
UID:6464-1713970800-1713974400@instituteofprivacydesign.org
SUMMARY:Q2 All Hands Meeting
DESCRIPTION:ALL HANDS MEETING 📢 Ambassadors\, Advisors\, Volunteers\, and Committee Members are all invited to join us Wednesday\, April 24th from 3:00 – 4:00 PM. We will meet to welcome our new members\, report on the new Standards Subcommittees\, and discuss the Privacy Design Seal currently in development! \nPlease reach out to admin22@instituteofprivacydesign.org if you have yet to receive an invitation. Guest invites are first come first serve. If you have a friend or colleague interested\, send us their email and we’ll add them to the guest list!
URL:https://instituteofprivacydesign.org/event/q2-all-hands-meeting/
LOCATION:https://iopd.whereby.com/all-hands
CATEGORIES:All Hands Meeting
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/04/AllHandsApr24.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Halifax:20240425T120000
DTEND;TZID=America/Halifax:20240425T130000
DTSTAMP:20260406T120222
CREATED:20240103T231906Z
LAST-MODIFIED:20240416T180307Z
UID:5410-1714046400-1714050000@instituteofprivacydesign.org
SUMMARY:From Permission Usage to Compliance Analysis | Privacy Engineering & Technology Education Discussion (PETed)
DESCRIPTION:Join our IOPD Privacy Engineering & Technology Education Discussion (PETed) Series! The format of the webinar will be a recorded 10-minute introduction followed by a 40-minute informal discussion and interaction with members of the IOPD. The goal will be a discussion on how to solve a specific privacy problem or privacy related resource topic and the latest implementation techniques for some of the biggest challenges like synthetic data\, zero-knowledge proofs\, homomorphic encryption\, and translucent databases. \nThe participants will be asked to bring questions related to the topic. Come back the fourth Thursday of every month for a new discussion\, new speaker\, and new insights on the most cutting-edge privacy challenges! \n  \nDate & Time:\nApril 25\, 2024 @ 12:00 PM EDT / 5:00 PM CET \n  \nTopic:\nFrom Permission Usage to Compliance Analysis: Lessons Learned Analyzing Android Apps for 10 years \n  \nSynopsis:\nWe have been analyzing Android apps for regulatory requirements for eight years. We have analyzed Android apps for COPPA\, CCPA\, and Health Compliance (HIPAA\, HBNR\, and FTC Act). In this talk\, I present the lessons learned after analyzing thousands of apps\, the technical challenges we face while analyzing Android apps\, patterns of non-compliance issues we uncovered\, and the likely root causes of non-compliance. The talk will touch upon challenges posed by third-party code in complying with regulatory requirements\, the importance of privacy assessment\, and how the technical realm has changed over time for privacy assessments. \n  \nProblem Statement:\nWhat are the risks posed by the use of third-party code in the mobile ecosystem? How can you identify those risks before they become a regulatory headache? \n  \nRelated PETs (Privacy-Enhancing Technologies):\n\nAccountability\nCode Transparency\nPermission Usage\nPrivacy Assessment\nDynamic Analysis\n\n  \nPre-Discussion Resources:\n\nhttps://petsymposium.org/popets/2018/popets-2018-0021.php \nhttps://www.usenix.org/system/files/sec19-reardon.pdf \nhttps://petsymposium.org/popets/2023/popets-2023-0072.php \nhttps://conpro23.ieee-security.org/papers/samarin-conpro23.pdf \nhttps://www.ieee-security.org/TC/SPW2021/ConPro/papers/samarin-conpro21.pdf \nhttps://www.ieee-security.org/TC/SPW2019/ConPro/papers/okoyomon-conpro19.pdf \nhttps://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-wijesekera.pdf \nhttps://petsymposium.org/popets/2022/popets-2022-0108.pdf \nhttps://petsymposium.org/popets/2020/popets-2020-0050.pdf \nhttps://www.issa.org/event/taking-responsibility-for-someone-elses-code-studying-the-privacy-behaviors-of-mobile-apps-at-scale/ \n\n  \nSpeaker:\nPrimal Wijesekera\nPrimal Wijesekera is a research scientist in the Usable Security and Privacy Research Group at ICSI and holds an EECS appointment at the University of California\, Berkeley. His research exposes current privacy and security vulnerabilities and provides systematic solutions to meet consumers’ privacy expectations. He has extensive experience in mobile app analysis for privacy and security violations and implementing privacy protections for Android. He has published in top-tier security venues (IEEE S&P\, USENIX Security) and usable security and privacy venues (ACM CHI\, SOUPS\, PETS). He received his Ph.D. from the University of British Columbia\, although he carried out his Ph.D. research at UC Berkeley. His research on privacy on mobile platforms has received the Caspar Bowden Award for Outstanding Research in Privacy Enhancing Technologies\, the USENIX Security Distinguished Paper Award\, the AEPD Emilio Aced Personal Data Protection Research Award\, and the CNIL-INRIA Privacy Award. He is a PI/Co-PI on multiple NSF Projects. He has also helped federal regulators in sensitive privacy investigations. He has also held an engineering position at Microsoft. \n  \nModerator:\nKimberly Lancaster \nTrusted Privacy Advisor who Guides Data Protection\, Drives Operational Excellence\, and Leads with Integrity by aligning with InfoSec\, Security\, GRC\, Compliance\, and Data Governance. Board Member\, Speaker\, and Author. \n  \nThe IOPD Privacy Engineering & Technology Education Discussion (PETed) Series is a members-only event. Join as an Ambassador before the 1st of each month to get invited to this month’s event! Please reach out to a current member to be invited as a guest. If you are already a member\, subscribe to our PETed Mailing List for announcements and monthly invitations!
URL:https://instituteofprivacydesign.org/event/march-2024-privacy-engineering-technology-education-discussion-peted/
LOCATION:https://iopd.whereby.com/peted-discussion
CATEGORIES:PETed
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/4-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240429T090000
DTEND;TZID=America/New_York:20240430T160000
DTSTAMP:20260406T120222
CREATED:20240213T224949Z
LAST-MODIFIED:20240409T190053Z
UID:6070-1714381200-1714492800@instituteofprivacydesign.org
SUMMARY:Artificial Intelligence Governance (AIGP)
DESCRIPTION:This training teaches critical artificial intelligence governance concepts that are also integral to the AIGP certification exam. While not purely a “test prep” course\, this training is appropriate for professionals who plan to certify\, as well as for those who want to deepen their AI governance knowledge. Both the training and the exam are based on the same body of knowledge. \n  \nWHAT YOU WILL LEARN: \nAIGP training teaches how to develop\, integrate and deploy trustworthy AI systems in line with emerging laws and policies. The curriculum provides an overview of AI technology\, survey of current law\, and strategies for risk management\, among many other relevant topics. \n  \nMODULES: \n\nModule 1: Foundations of artificial intelligence\nDefines AI and machine learning\, presents an overview of the different types of AI systems and their use cases\, and\npositions AI models in the broader socio-cultural context.\nModule 2: AI impacts on people and responsible AI principles\nOutlines the core risks and harms posed by AI systems\, the characteristics of trustworthy AI systems\, and the\nprinciples essential to responsible and ethical AI.\nModule 3: AI development life cycle\nDescribes the AI development life cycle and the broad context in which AI risks are managed.\nModule 4: Implementing responsible AI governance and risk management\nExplains how major AI stakeholders collaborate in a layered approach to manage AI risks while acknowledging AI\nsystems’ potential societal benefits.\nModule 5: Implementing AI projects and systems\nOutlines mapping\, planning and scoping AI projects\, testing and validating AI systems during development\, and\nmanaging and monitoring AI systems after deployment.\nModule 6: Current laws that apply to AI systems\nSurveys the existing laws that govern the use of AI\, outlines key GDPR intersections\, and provides awareness of\nliability reform\nModule 7: Existing and emerging AI laws and standards\nDescribes global AI-specific laws and the major frameworks and standards that exemplify how AI systems can be\nresponsibly governed.\nModule 8: Ongoing AI issues and concerns\nPresents current discussions and ideas about AI governance\, including awareness of legal issues\, user concerns\, and AI auditing and accountability issues.\n\n  \n\n  \n*Certification Study Group voucher must be used within three months of taking the course. \n**The IAPP exam must be taken within three months of the release of the exam (anticipated release in 1st quarter of 2024). Refresher course must be taken within three months of completing the IAPP exam. \n*** 1 Year Membership valid with first course taken with Privacy Ref \n  \n*** Links to Privacy Ref Include Web Tracking***
URL:https://instituteofprivacydesign.org/event/artificial-intelligence-governance-aigp-utm_sourceiopdutm_mediumwebsiteutm_campaigniopdq1-2024-2/
LOCATION:Hybrid (Online & In-Person)
CATEGORIES:#privacytraining,#AIGP
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240502T130000
DTEND;TZID=America/New_York:20240502T140000
DTSTAMP:20260406T120222
CREATED:20240313T165147Z
LAST-MODIFIED:20240313T165147Z
UID:6406-1714654800-1714658400@instituteofprivacydesign.org
SUMMARY:Privacy and the SMBs
DESCRIPTION:With the introduction of new privacy laws\, we are frequently asked “what do I need to do?” by business owners. Recently\, the question is coming from SMB owners who are unclear if the emerging privacy laws apply to them. \n \n\nJoin Bob Siegel and Benjamin Siegel as they discuss the challenges the SMB face establishing a privacy program. \nJoin us for all our monthly webinar conversations\, where we take a deep dive into current events happening globally\, and topics that have an impact on the decision making\, processing\, or transfer of personal data. \nQuestions are welcome! Please submit them to info@privacyref.com. Contact us\, send us your comments and suggestions.
URL:https://instituteofprivacydesign.org/event/privacy-and-the-smbs/
LOCATION:Online
CATEGORIES:Speaking Engagements,Webinar
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240502T150000
DTEND;TZID=America/New_York:20240502T170000
DTSTAMP:20260406T120222
CREATED:20240222T141005Z
LAST-MODIFIED:20240410T194710Z
UID:6232-1714662000-1714669200@instituteofprivacydesign.org
SUMMARY:Certification Study Group - Privacy Program Management (CIPM)
DESCRIPTION:There are many ways to prepare for taking a certification exam from the International Association of Privacy Professionals. No matter how you study\, there always seem to be some questions that remain. Privacy Ref can help. \nCome prepared to this 2-hour session with questions or areas related to the exam that you want to review. We will be making use of the exam blueprint and body of knowledge provided by the IAPP to focus our discussion.
URL:https://instituteofprivacydesign.org/event/certification-study-group-privacy-program-management-cipm-2/
LOCATION:Online
CATEGORIES:#CIPM,#certificationstudygroup
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240506T150000
DTEND;TZID=America/New_York:20240508T190000
DTSTAMP:20260406T120222
CREATED:20240405T143312Z
LAST-MODIFIED:20240410T194844Z
UID:6477-1715007600-1715194800@instituteofprivacydesign.org
SUMMARY:CIPP/E Certified Privacy Professional / Europe
DESCRIPTION:Why You Should Take European Data Protection Training \nThe European Union’s GDPR and the data privacy laws of individual European nations are among the world’s strictest\, carrying high fines for improperly handling personal information. IAPP European Data Protection Training\, the training aligned with ANAB-accredited CIPP/E certification\, is in-depth instruction on understanding and applying laws governing data collection\, processing and management. \nWho Should Train \nEuropean and international data protection professionals who manage or work within GDPR and European national compliance frameworks\, and/or those pursuing CIPP/E certification. IAPP European Data Protection training helps satisfy GDPR requirements for DPOs (data protection officers) responsible for monitoring compliance\, managing data protection activities\, etc. \nWhat You Will Learn \nCIPP/E training builds a deep understanding of European laws\, regulations and policy frameworks. The curriculum includes explanations of European regulatory structures; concepts of data protection; major laws including the GDPR and the ePrivacy Directive; and more. \nTraining and certification program\n1) Training program registration (click here to register) \n2) Kick off meeting \n> Agree on schedule \n> Develop personalized study plan \n> Agree on training format (time zone\, 2-3-4 days\, back2back or consecutive days/weeks) \n3) Pre-training material self-study including mentoring on per needed basis following personalized study plan \n4) In-person or Online training based on schedule and training format (proposed schedule is illustrative) \n5) Post-training exam preparation and mentoring (IAPP propose 30 hrs\, our experience is 2-4 weeks) We do not recommend to exceed 8 weeks after the training. IAPP exam voucher deadline is 12 month after purchase. \nTraining package price is covering:\n1) IAPP membership for 12 month (if you already have a valid IAPP membership it will be extended after expire date) \n2) All IAPP benefits you have as within professional membership including the access to resources and libraries \n3) digital editions of CIPP/E training materials provided by IAPP \n4) additional resources for training and exam preparation provided by Bello Consulting \n5) CIPP/E exam voucher valid for 12 month after purchase \n6) training in-person or online according to agreed format \n7) pre and post training mentoring \nAbout your trainer\nTraining is run by William Bello FIP CIPP/E CIPP/US CIPM CIPT ITIL and AIGP authorized trainer. William has more then 40yrs of experience at all levels in IT and business architecture and 7 years of dedicated privacy / data protection practice as a DPO and privacy professional trainer. William is member of EDPB expert team. Bello Consulting is IAPP Official training partner. \nWhy you should opt-in for training with us\nWilliam will prepare you for exam in a unique\, efficient and very effective way. It is experience that will not only help you to pass the exam but it will also provide you with guidance that will help you in your everyday work.  The unprecedented expertise and knowledge you will receive is going to enable change of your carrier to new heights. We are supporting you all the way until you successfully earn the CIPP/E certification – and beyond – if you need advice and help. \nImportant notice\nPrice is without VAT. Individuals have to add 25% VAT. Companies are VAT reverse charge. Payment terms are flexible and individuals sponsoring is available. Ask for details. \nTRAINING IS SCHEDULLED FOR Monday – Wednesday: 3pm – 7pm CET (GMT+1) \nHow to opt-in for training\nOption 1. Visit the CertShop here and purchase the training package \nOption 2. Register here (recomended) and we will contact you to personalise your training schedule and payment
URL:https://instituteofprivacydesign.org/event/cipp-e-certified-privacy-professional-europe/
LOCATION:Online
CATEGORIES:#CIPP/E
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/03/65ead9afb289c-3.png
ORGANIZER;CN="Bello Consulting":MAILTO:iapp@bello.hr
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240513T090000
DTEND;TZID=America/New_York:20240514T160000
DTSTAMP:20260406T120222
CREATED:20240216T151252Z
LAST-MODIFIED:20240507T173907Z
UID:6163-1715590800-1715702400@instituteofprivacydesign.org
SUMMARY:U.S. Private-Sector Privacy (CIPP/US)
DESCRIPTION:U.S. Private-Sector Privacy CIPP/US provides an overview of data protection laws and regulations in the U.S and an understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S.\, the EU and other jurisdictions. The U.S. Private-Sector Privacy CIPP/US program was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations. \nThe content of the U.S. Private-Sector Privacy CIPP/US courses is integral to broadening your knowledge\, educating your privacy team\, and put you on the path to obtaining your privacy certifications. \nCourse Outline: \n\nModule 1: Introduction to privacy\nModule 2: Structure of U.S. law\nModule 3: General Data Protection Regulation overview\nModule 4: The California Consumer Privacy Act\nModule 5: Enforcement of U.S. privacy and security laws\nModule 6: Information management from a U.S. perspective\nModule 7: Federal versus state authority\nModule 8: Healthcare\nModule 9: Financial privacy\nModule 10: Education\nModule 11: Telecommunications and marketing\nModule 12: Law enforcement and privacy\nModule 13: National security and privacy\nModule 14: Civil litigation and privacy\nModule 15: Legal overview of workplace privacy\nModule 16: Privacy before\, during and after employment\nModule 17: State data security laws\nModule 18: Data breach notification laws\n\n  \n\n*Certification Study Group voucher must be used within three months of taking the course. \n**The IAPP exam must be taken within three months of the release of the exam. Refresher course must be taken within three months of completing the IAPP exam. \n*** 1 Year Membership valid with first course taken with Privacy Ref
URL:https://instituteofprivacydesign.org/event/u-s-private-sector-privacy-cipp-us/
LOCATION:Hybrid (Online & In-Person)
CATEGORIES:#privacytraining,#CIPP/US
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Halifax:20240523T120000
DTEND;TZID=America/Halifax:20240523T130000
DTSTAMP:20260406T120222
CREATED:20240314T182713Z
LAST-MODIFIED:20240514T201232Z
UID:6408-1716465600-1716469200@instituteofprivacydesign.org
SUMMARY:Data Access and Deletion in the Large Scale Structured and Unstructured Datasets | Privacy Engineering & Technology Education Discussion (PETed)
DESCRIPTION:Join our IOPD Privacy Engineering & Technology Education Discussion (PETed) Series! The format of the webinar will be a recorded 10-minute introduction followed by a 40-minute informal discussion and interaction with members of the IOPD. The goal will be a discussion on how to solve a specific privacy problem or privacy related resource topic and the latest implementation techniques for some of the biggest challenges like synthetic data\, zero-knowledge proofs\, homomorphic encryption\, and translucent databases. \nThe participants will be asked to bring questions related to the topic. Come back the fourth Thursday of every month for a new discussion\, new speaker\, and new insights on the most cutting-edge privacy challenges! \n  \nDate & Time:\nMay 23\, 2024 @ 12:00 PM EDT / 6:00 PM CEST \n  \nTopic:\nData Access and Deletion in the Large Scale Structured and Unstructured Datasets \n  \nSynopsis:\nMany jurisdictions grant the public the rights to access and request deletion of their data. As privacy technologists\, it often falls to us to create the systems for responding to these requests. While a response may seem simple on its face (grab all of the data related to this person)\, there are a host of both technical and organizational challenges when responding to these requests at scale\, including: keeping an up to date map between people and the systems that store their data; issuing access and deleting requests without affecting production system performance; and redacting information unrelated to the subject from unstructured data. We’ll talk through these and other challenges and how privacy teams can tackle them. \n  \nProblem Statement:\nPrivacy technologists struggle to efficiently handle large-scale requests for data access and deletion due to challenges in mapping data across systems\, avoiding production disruptions\, and redacting unrelated information from unstructured data. This requires scalable solutions to ensure regulatory compliance and protect data rights without compromising system performance. \n  \nRelated PETs (Privacy-Enhancing Technologies):\nThere are a variety of PETs potentially involved\, most notably tools for anonymization/pseudonymization. There are also a large number of data and ML-related engineering technical topics to be discussed. \n  \nPre-Discussion Resources:\n\nLea Kissner writing for the IAPP about considerations for data retention/deletion: https://iapp.org/news/a/data-retention-in-a-distributed-system/\nKatharina Koerner speaking at PEPR 2023 about legal standards for anonymization/deidentification\, which are critical to understand in the context of determining what needs to be deleted: https://www.youtube.com/watch?v=m5u3AM5PaD4\nNandita Rao Narla at PEPR 2021 about data deletion: https://www.youtube.com/watch?v=f6-EUEmBuPw&list=PL_cjZ5iVWe7n0sU5g0o8zTZSMLAvfl4nL&index=8\nUK ICO FAQ on responding to employee access request\, with some really helpful examples detailing just how much sifting through of documents needs to be done: https://ico.org.uk/for-organisations/uk-gdpr-guidance-and-resources/employment/subject-access-request-q-and-as-for-employers/\n\n  \nSpeaker:\nJosh Schwartz\nJosh Schwartz is the CEO and cofounder of Phaselab\, a startup that helps privacy teams manage their unstructured data. Prior to founding Phaselab he served as CTO and Data Protection Officer of Chartbeat\, a leading analytics company\, where he led the operation of petabyte-scale data infrastructure. He studied machine learning as a PhD student at MIT’s Computer Science and Artificial Intelligence lab. \n  \nModerator:\nNicole Nguyen \nNicole Nguyen is an enthusiastic privacy professional\, deftly bridging technology\, business\, and law. Beginning in intellectual property and patent prosecution\, she gained practical legal insights and technical acumen\, which she later applied to data privacy across various regulated industries. She honed her skills across operations\, regulatory analysis\, and engineering\, to streamline data handling\, shape privacy policies\, and drive privacy-by-design principles. Recognized for her leadership and technical prowess\, Nicole guides strategic decisions\, resolves complex issues\, and bolsters business resilience. Her passion lies in crafting comprehensive data governance programs\, weaving security\, privacy\, and risk disciplines into robust frameworks that safeguard business value and promote a future-ready\, privacy-conscious culture. B.S. Chemical and Electrical Engineering and M.S. Information Systems\, Cybersecurity and Business Intelligence. \n  \nThe IOPD Privacy Engineering & Technology Education Discussion (PETed) Series is a members-only event. Join as an Ambassador before the 1st of each month to get invited to this month’s event! Please reach out to a current member to be invited as a guest. If you are already a member\, subscribe to our PETed Mailing List for announcements and monthly invitations!
URL:https://instituteofprivacydesign.org/event/data-access-and-deletion-in-the-large-scale-structured-and-unstructured-datasets-privacy-engineering-technology-education-discussion-peted/
LOCATION:https://iopd.whereby.com/peted-discussion
CATEGORIES:PETed
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/03/4.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240523T130000
DTEND;TZID=America/New_York:20240523T150000
DTSTAMP:20260406T120222
CREATED:20240222T141256Z
LAST-MODIFIED:20240520T165513Z
UID:6234-1716469200-1716476400@instituteofprivacydesign.org
SUMMARY:Certification Study Group - U.S. Private-Sector Privacy (CIPP/US)
DESCRIPTION:There are many ways to prepare for taking a certification exam from the International Association of Privacy Professionals. No matter how you study\, there always seem to be some questions that remain. Privacy Ref can help. \nCome prepared to this 2-hour session with questions or areas related to the exam that you want to review. We will be making use of the exam blueprint and body of knowledge provided by the IAPP to focus our discussion.
URL:https://instituteofprivacydesign.org/event/certification-study-group-u-s-private-sector-privacy-cipp-us-2/
LOCATION:Online
CATEGORIES:#CIPP/US,#certificationstudygroup
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240528T090000
DTEND;TZID=America/New_York:20240529T160000
DTSTAMP:20260406T120222
CREATED:20240216T152305Z
LAST-MODIFIED:20240520T161437Z
UID:6165-1716886800-1716998400@instituteofprivacydesign.org
SUMMARY:Artificial Intelligence Governance (AIGP)
DESCRIPTION:This training teaches critical artificial intelligence governance concepts that are also integral to the AIGP certification exam. While not purely a “test prep” course\, this training is appropriate for professionals who plan to certify\, as well as for those who want to deepen their AI governance knowledge. Both the training and the exam are based on the same body of knowledge. \nWHAT YOU WILL LEARN: \nAIGP training teaches how to develop\, integrate and deploy trustworthy AI systems in line with emerging laws and policies. The curriculum provides an overview of AI technology\, survey of current law\, and strategies for risk management\, among many other relevant topics. \nMODULES: \n\nModule 1: Foundations of artificial intelligence\nDefines AI and machine learning\, presents an overview of the different types of AI systems and their use cases\, and\npositions AI models in the broader socio-cultural context.\nModule 2: AI impacts on people and responsible AI principles\nOutlines the core risks and harms posed by AI systems\, the characteristics of trustworthy AI systems\, and the\nprinciples essential to responsible and ethical AI.\nModule 3: AI development life cycle\nDescribes the AI development life cycle and the broad context in which AI risks are managed.\nModule 4: Implementing responsible AI governance and risk management\nExplains how major AI stakeholders collaborate in a layered approach to manage AI risks while acknowledging AI\nsystems’ potential societal benefits.\nModule 5: Implementing AI projects and systems\nOutlines mapping\, planning and scoping AI projects\, testing and validating AI systems during development\, and\nmanaging and monitoring AI systems after deployment.\nModule 6: Current laws that apply to AI systems\nSurveys the existing laws that govern the use of AI\, outlines key GDPR intersections\, and provides awareness of\nliability reform\nModule 7: Existing and emerging AI laws and standards\nDescribes global AI-specific laws and the major frameworks and standards that exemplify how AI systems can be\nresponsibly governed.\nModule 8: Ongoing AI issues and concerns\nPresents current discussions and ideas about AI governance\, including awareness of legal issues\, user concerns\, and AI auditing and accountability issues.\n\n \nCLASS MATERIALS INCLUDE: \n\nTwo full days of training\nElectronic and hardcopy version of the participant guide\nA 1-year IAPP membership with first class (applied to renewal for current IAPP members)\nVoucher to sit for the certification exam\nVoucher for a Certification Study Group*\nOptional refresher course should you fail the IAPP exam **\n\n\n* Certification Study Group voucher must be used within three months of taking the course. \n** The IAPP exam must be taken within three months of completion of the class. Refresher course must be taken within three months of completing the IAPP exam. \n*** 1 Year Membership valid with first course taken with Privacy Ref
URL:https://instituteofprivacydesign.org/event/artificial-intelligence-governance-aigp/
LOCATION:Hybrid (Online & In-Person)
CATEGORIES:#privacytraining,#AIGP
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240606
DTEND;VALUE=DATE:20240628
DTSTAMP:20260406T120222
CREATED:20240120T132204Z
LAST-MODIFIED:20240205T234146Z
UID:5672-1717632000-1719532799@instituteofprivacydesign.org
SUMMARY:The Privacy Pro CIPM Certification Course - June 6\, 13\, 20\, 27
DESCRIPTION:[Prices are in Canadian Dollars. To attend an informational session register here.] \nMake data privacy regulations work for your organization by understanding how to implement them in day-to-day operations. Learn to create a company vision\, structure a data protection team\, develop and implement system frameworks\, communicate to stakeholders\, measure performance and more. \n  \nWhat you will learn: \n\nHow to create a company vision\nHow to structure the privacy team\nHow to develop and implement a privacy program framework\nHow to communicate to stakeholders\nHow to measure performance\nThe privacy program operational life cycle\n\n  \nYour CIPM course includes: \n\nCIPM digital textbook\nExam voucher ($550 USD value)\nOne year of IAPP membership ($275 USD value)\nParticipant guide and sample exam questions\nAccess to class recordings\nExam study session
URL:https://instituteofprivacydesign.org/event/iapp-cipm-virtual-june-6-13-20-27/
LOCATION:Virtual
CATEGORIES:#privacytraining,#CIPM
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/the_privacy_pro-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240606T130000
DTEND;TZID=America/New_York:20240606T150000
DTSTAMP:20260406T120222
CREATED:20240222T141545Z
LAST-MODIFIED:20240410T194905Z
UID:6236-1717678800-1717686000@instituteofprivacydesign.org
SUMMARY:Certification Study Group - European Data Protection (CIPP/E)
DESCRIPTION:There are many ways to prepare for taking a certification exam from the International Association of Privacy Professionals. No matter how you study\, there always seem to be some questions that remain. Privacy Ref can help. \nCome prepared to this 2-hour session with questions or areas related to the exam that you want to review. We will be making use of the exam blueprint and body of knowledge provided by the IAPP to focus our discussion.
URL:https://instituteofprivacydesign.org/event/certification-study-group-european-data-protection-cipp-e/
LOCATION:Online
CATEGORIES:#CIPP/US,#certificationstudygroup
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Toronto:20240610T120000
DTEND;TZID=America/Toronto:20240610T133000
DTSTAMP:20260406T120222
CREATED:20240516T214754Z
LAST-MODIFIED:20240516T215052Z
UID:6621-1718020800-1718026200@instituteofprivacydesign.org
SUMMARY:Privacy Engineering for All: Operationalizing Data Minimization | IAPP Canada Privacy Symposium 2024
DESCRIPTION:Privacy Engineering for All: Operationalizing Data Minimization\nMon\, June 10 @ 12:00 p.m. – 1:15 p.m.\n\n\n\nIAPP Canada Privacy Symposium – Traditional Breakout \n\n\nIn today’s world\, access to large amounts of data is considered a valuable asset\, especially within the context of building AI systems. However\, having such access may run counter to fundamental privacy principles. Privacy regulatory regimes globally recognize that data minimization is imperative to reducing privacy risks. There are a number of data minimization practices such as collection\, storage\, disclosure\, and the linkability of data that often falls within the purview of privacy engineers. Privacy engineers are usually tasked with turning privacy requirements into technical realities. They suggest various tools\, techniques and best practices to embed privacy into the design of systems\, processes and practices to ensure that privacy standards are consistently applied across a company’s products and services\, often in the face of increasing regulatory requirements. Data minimization is essential to ensure that personal information is appropriately safeguarded and accordingly\, the demand for privacy engineering will only increase. \n  \nWhat you will learn: \n\nAn understanding of the practice of data minimization — including but not limited to data classification\, inventory\, mapping and lineage.\nTools and techniques used to implement data minimization\, such as differential privacy\, anonymization\, pseudonymization and redaction.\nAn understanding of the statutory requirements related to data minimization — including GDPR\, PIPEDA/Bill C-27 and CCPA/CPRA.\n\n\n  \nSpeakers:\nKuljit Bhogal\, CIPP/C\, Associate\, Privacy and Data Management\, Osler\, Hoskin & Harcourt \nR. Jason Cronk\, CIPP/US\, CIPM\, CIPT\, FIP\, Privacy Engineer\, Author\, Enterprivacy Consulting Group \nSaima Fancy\, CIPP/C\, Senior Privacy Specialist\, Ontario Health \nPatricia Thaine\, Co-Founder and CEO\, Private AI \n  \n  \nLearn More at https://iapp.org/conference/iapp-canada-privacy-symposium/ 
URL:https://instituteofprivacydesign.org/event/privacy-engineering-for-all-operationalizing-data-minimization-iapp-canada-privacy-symposium-2024/
CATEGORIES:Speaking Engagements,Conference
ATTACH;FMTTYPE=image/jpeg:https://instituteofprivacydesign.org/wp-content/uploads/2024/05/Screenshot_16-5-2024_143456_iapp.org_.jpeg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240612T090000
DTEND;TZID=America/New_York:20240613T160000
DTSTAMP:20260406T120222
CREATED:20240216T165023Z
LAST-MODIFIED:20240520T161104Z
UID:6169-1718182800-1718294400@instituteofprivacydesign.org
SUMMARY:Privacy Program Management (CIPM)
DESCRIPTION:Privacy Program Management teaches you how to create and manage a privacy program. It gives you the tools to answer day-to-day questions about privacy operations. The CIPM is the world’s first and only certification in privacy program management. When you earn a CIPM\, it shows that you know how to make a privacy program work for your organization. \nThe content of the courses is integral to broadening your knowledge\, educating your privacy team\, and put you on the path to obtaining your privacy certifications. \nCourse outline: \n\nModule 1: Introduction to privacy program management\nModule 2: Privacy  Governance\nModule 3: Applicable laws and regulations\nModule 4: Data assessments\nModule 5: Policies\nModule 6: Data subject rights\nModule 7: Training and awareness\nModule 8: Protecting personal information\nModule 9: Data breach incident plans\nModule 10: Monitoring and auditing program performance\n\n \nClass materials include: \n\nTwo full days of training\nElectronic and hardcopy version of the textbook and participant guide\nA 1-year IAPP membership with first class (applied to renewal for current IAPP members)\nVoucher to sit for the certification exam\nVoucher for a Certification Study Group*\nOptional refresher course should you fail the IAPP exam **\n\n\n* Certification Study Group voucher must be used within three months of taking the course. \n** The IAPP exam must be taken within three months of the release of the exam. Refresher course must be taken within three months of completing the IAPP exam. \n*** 1 Year Membership valid with first course taken with Privacy Ref
URL:https://instituteofprivacydesign.org/event/privacy-program-management-cipm-2/
LOCATION:Hybrid (Online & In-Person)
CATEGORIES:#privacytraining,#CIPM
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240613T130000
DTEND;TZID=America/New_York:20240613T150000
DTSTAMP:20260406T120222
CREATED:20240222T141828Z
LAST-MODIFIED:20240410T194918Z
UID:6238-1718283600-1718290800@instituteofprivacydesign.org
SUMMARY:Certification Study Group - Privacy In Technology (CIPT)
DESCRIPTION:There are many ways to prepare for taking a certification exam from the International Association of Privacy Professionals. No matter how you study\, there always seem to be some questions that remain. Privacy Ref can help. \nCome prepared to this 2-hour session with questions or areas related to the exam that you want to review. We will be making use of the exam blueprint and body of knowledge provided by the IAPP to focus our discussion.
URL:https://instituteofprivacydesign.org/event/certification-study-group-privacy-in-technology-cipt-2/
LOCATION:Online
CATEGORIES:#CIPT,#certificationstudygroup
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240617T090000
DTEND;TZID=America/New_York:20240618T160000
DTSTAMP:20260406T120222
CREATED:20240216T170901Z
LAST-MODIFIED:20240507T173410Z
UID:6177-1718614800-1718726400@instituteofprivacydesign.org
SUMMARY:Artificial Intelligence Governance (AIGP)
DESCRIPTION:This training teaches critical artificial intelligence governance concepts that are also integral to the AIGP certification exam. While not purely a “test prep” course\, this training is appropriate for professionals who plan to certify\, as well as for those who want to deepen their AI governance knowledge. Both the training and the exam are based on the same body of knowledge. \nWHAT YOU WILL LEARN: \nAIGP training teaches how to develop\, integrate and deploy trustworthy AI systems in line with emerging laws and policies. The curriculum provides an overview of AI technology\, survey of current law\, and strategies for risk management\, among many other relevant topics. \nMODULES: \n\nModule 1: Foundations of artificial intelligence\nDefines AI and machine learning\, presents an overview of the different types of AI systems and their use cases\, and\npositions AI models in the broader socio-cultural context.\nModule 2: AI impacts on people and responsible AI principles\nOutlines the core risks and harms posed by AI systems\, the characteristics of trustworthy AI systems\, and the\nprinciples essential to responsible and ethical AI.\nModule 3: AI development life cycle\nDescribes the AI development life cycle and the broad context in which AI risks are managed.\nModule 4: Implementing responsible AI governance and risk management\nExplains how major AI stakeholders collaborate in a layered approach to manage AI risks while acknowledging AI\nsystems’ potential societal benefits.\nModule 5: Implementing AI projects and systems\nOutlines mapping\, planning and scoping AI projects\, testing and validating AI systems during development\, and\nmanaging and monitoring AI systems after deployment.\nModule 6: Current laws that apply to AI systems\nSurveys the existing laws that govern the use of AI\, outlines key GDPR intersections\, and provides awareness of\nliability reform\nModule 7: Existing and emerging AI laws and standards\nDescribes global AI-specific laws and the major frameworks and standards that exemplify how AI systems can be\nresponsibly governed.\nModule 8: Ongoing AI issues and concerns\nPresents current discussions and ideas about AI governance\, including awareness of legal issues\, user concerns\, and AI auditing and accountability issues.\n\n  \n\n  \n*Certification Study Group voucher must be used within three months of taking the course. \n**The IAPP exam must be taken within three months of the release of the exam (anticipated release in 1st quarter of 2024). Refresher course must be taken within three months of completing the IAPP exam. \n*** 1 Year Membership valid with first course taken with Privacy Ref
URL:https://instituteofprivacydesign.org/event/artificial-intelligence-governance-aigp-2/
LOCATION:Hybrid (Online & In-Person)
CATEGORIES:#privacytraining,#AIGP
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240619T130000
DTEND;TZID=America/New_York:20240619T150000
DTSTAMP:20260406T120222
CREATED:20240520T165025Z
LAST-MODIFIED:20240520T170136Z
UID:6669-1718802000-1718809200@instituteofprivacydesign.org
SUMMARY:Certification Study Group - Artificial Intelligence Governance (AIGP)
DESCRIPTION:There are many ways to prepare for taking a certification exam from the International Association of Privacy Professionals. No matter how you study\, there always seem to be some questions that remain. Privacy Ref can help. \nCome prepared to this 2-hour session with questions or areas related to the exam that you want to review. We will be making use of the exam blueprint and body of knowledge provided by the IAPP to focus our discussion.
URL:https://instituteofprivacydesign.org/event/certification-study-group-artificial-intelligence-governance-aigp-2/
LOCATION:Online
CATEGORIES:#privacytraining,#AIGP,#certificationstudygroup
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240620T130000
DTEND;TZID=America/New_York:20240620T150000
DTSTAMP:20260406T120222
CREATED:20240222T142100Z
LAST-MODIFIED:20240410T194930Z
UID:6240-1718888400-1718895600@instituteofprivacydesign.org
SUMMARY:Certification Study Group - U.S. Private-Sector Privacy (CIPP-US)
DESCRIPTION:There are many ways to prepare for taking a certification exam from the International Association of Privacy Professionals. No matter how you study\, there always seem to be some questions that remain. Privacy Ref can help. \nCome prepared to this 2-hour session with questions or areas related to the exam that you want to review. We will be making use of the exam blueprint and body of knowledge provided by the IAPP to focus our discussion.
URL:https://instituteofprivacydesign.org/event/certification-study-group-u-s-private-sector-privacy-cipp-us-3/
LOCATION:Online
CATEGORIES:#CIPP/US,#certificationstudygroup
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240620T160000
DTEND;TZID=America/New_York:20240620T170000
DTSTAMP:20260406T120222
CREATED:20240606T201206Z
LAST-MODIFIED:20240620T195953Z
UID:6765-1718899200-1718902800@instituteofprivacydesign.org
SUMMARY:Let's Talk Privacy Certifications | Pop-Up Webinar
DESCRIPTION:Date & Time:\nJune 20\, 2024 @ 4:00 PM EDT \n  \nSynopsis:\nCertification can be a wonderful validation that a company is doing something right. But the certification market can be confusing and hard to interpret at times. Different certifications apply to different aspect of company’s operation. The menagerie of players (certification bodies\, assurance assessors\, schema owners) can be mind-numbing. In our journey to create standards and certifications\, the IOPD has had to untangle this mess to find our own role in this vast and complex ecosystem. While we’re blogged about this previously\, this webinar will go further looking at many of the privacy certifications currently on the market\, including: \n\n\n\n\nEuropean Data Protection Seal\nMSECB ISO 31700-1:2023 – Privacy by Design Framework\nLOCS:23 Standard\nCARU Safe Harbor Program\nTRUSTe Enterprise Privacy Certification\nISO 27701\nas well as our own Design Process Standard and forthcoming Privacy by Design and Default Trustmark\n\n\n  \nSpeaker:\nR Jason Cronk \nWith over two decades of experience in principle and trust consultancy\, Jason Cronk is a seasoned privacy engineer\, developer\, author of the IAPP textbook “Strategic Privacy by Design\,” Privacy Engineering Section Leader at the IAPP\, and founder and president of the Institute of Operational Privacy Design. His knowledge and involvement reaches across the spectrum as an active member of the academic\, engineering\, legal and professional privacy communities and a pioneering voice in the development of privacy by design.
URL:https://instituteofprivacydesign.org/event/lets-talk-privacy-certifications/
LOCATION:https://iopd.whereby.com/institute-of-operational-privacy-design
CATEGORIES:IOPD Events
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/06/grfwecedc.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240624T090000
DTEND;TZID=America/New_York:20240625T160000
DTSTAMP:20260406T120222
CREATED:20240216T165423Z
LAST-MODIFIED:20240703T212636Z
UID:6171-1719219600-1719331200@instituteofprivacydesign.org
SUMMARY:U. S. Private-Sector Privacy (CIPP/US)
DESCRIPTION:U.S. Private-Sector Privacy CIPP/US provides an overview of data protection laws and regulations in the U.S and an understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S.\, the EU and other jurisdictions. The U.S. Private-Sector Privacy CIPP/US program was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations. \nThe content of the U.S. Private-Sector Privacy CIPP/US courses is integral to broadening your knowledge\, educating your privacy team\, and put you on the path to obtaining your privacy certifications. \nCourse Outline: \n\nModule 1: Introduction to privacy\nModule 2: Structure of U.S. law\nModule 3: General Data Protection Regulation overview\nModule 4: The California Consumer Privacy Act\nModule 5: Enforcement of U.S. privacy and security laws\nModule 6: Information management from a U.S. perspective\nModule 7: Federal versus state authority\nModule 8: Healthcare\nModule 9: Financial privacy\nModule 10: Education\nModule 11: Telecommunications and marketing\nModule 12: Law enforcement and privacy\nModule 13: National security and privacy\nModule 14: Civil litigation and privacy\nModule 15: Legal overview of workplace privacy\nModule 16: Privacy before\, during and after employment\nModule 17: State data security laws\nModule 18: Data breach notification laws\n\n \nClass materials include: \n\nTwo full days of training\nElectronic and hardcopy version of the textbook and participant guide\nA 1-year IAPP membership with first class (applied to renewal for current IAPP members)\nVoucher to sit for the certification exam\nVoucher for a Certification Study Group*\nOptional refresher course should you fail the IAPP exam **\n\n\n* Certification Study Group voucher must be used within three months of taking the course. \n** The IAPP exam must be taken within three months of completion of the class. Refresher course must be taken within three months of completing the IAPP exam. \n*** 1 Year Membership valid with first course taken with Privacy Ref
URL:https://instituteofprivacydesign.org/event/u-s-private-sector-privacy-cipp-us-2/
LOCATION:Hybrid (Online & In-Person)
CATEGORIES:#privacytraining,#CIPP/US
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240624T090000
DTEND;TZID=America/New_York:20240627T160000
DTSTAMP:20260406T120222
CREATED:20240216T170026Z
LAST-MODIFIED:20240520T161607Z
UID:6173-1719219600-1719504000@instituteofprivacydesign.org
SUMMARY:U.S. Privacy Officer Readiness (CIPP/US) + (CIPM)
DESCRIPTION:U.S. Private-Sector Privacy CIPP/US provides an overview of data protection laws and regulations in the U.S and an understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S.\, the EU and other jurisdictions. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations. \nPrivacy Program Management teaches you how to create and manage a privacy program. It gives you the tools to answer day-to-day questions about privacy operations. When you earn a CIPM\, it shows that you know how to make a privacy program work for your organization. \nCIPP/US Course Outline: \n\nModule 1: Introduction to privacy\nModule 2: Structure of U.S. law\nModule 3: General Data Protection Regulation overview\nModule 4: The California Consumer Privacy Act\nModule 5: Enforcement of U.S. privacy and security laws\nModule 6: Information management from a U.S. perspective\nModule 7: Federal versus state authority\nModule 8: Healthcare\nModule 9: Financial privacy\nModule 10: Education\nModule 11: Telecommunications and marketing\nModule 12: Law enforcement and privacy\nModule 13: National security and privacy\nModule 14: Civil litigation and privacy\nModule 15: Legal overview of workplace privacy\nModule 16: Privacy before\, during and after employment\nModule 17: State data security laws\nModule 18: Data breach notification laws\n\nCIPM Course Outline: \n\nModule 1: Introduction to privacy program management\nModule 2: Privacy  Governance\nModule 3: Applicable laws and regulations\nModule 4: Data assessments\nModule 5: Policies\nModule 6: Data subject rights\nModule 7: Training and awareness\nModule 8: Protecting personal information\nModule 9: Data breach incident plans\nModule 10: Monitoring and auditing program performance\n\n \nClass materials include: \n\nFour full days of training\nElectronic and hardcopy versions of the textbook and participant guide\nA 1-year IAPP membership with first class (applied to renewal for current IAPP members)\nVoucher to sit for the certification exam\nVoucher for a Certification Study Group*\nOptional refresher course should you fail the IAPP exam **\n\n\n* Certification Study Group voucher must be used within three months of taking the course. \n** The IAPP exam must be taken within three months of the release of the exam. Refresher course must be taken within three months of completing the IAPP exam. \n*** 1 Year Membership valid with first course taken with Privacy Ref
URL:https://instituteofprivacydesign.org/event/u-s-privacy-officer-readiness-cipp-us-cipm/
LOCATION:Hybrid (Online & In-Person)
CATEGORIES:#privacytraining,#CIPM,#CIPP/US
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240626T090000
DTEND;TZID=America/New_York:20240627T160000
DTSTAMP:20260406T120222
CREATED:20240216T170438Z
LAST-MODIFIED:20240520T161013Z
UID:6175-1719392400-1719504000@instituteofprivacydesign.org
SUMMARY:Privacy Program Management (CIPM)
DESCRIPTION:Privacy Program Management teaches you how to create and manage a privacy program. It gives you the tools to answer day-to-day questions about privacy operations. The CIPM is the world’s first and only certification in privacy program management. When you earn a CIPM\, it shows that you know how to make a privacy program work for your organization. \nThe content of the courses is integral to broadening your knowledge\, educating your privacy team\, and put you on the path to obtaining your privacy certifications. \nCourse outline: \n\nModule 1: Introduction to privacy program management\nModule 2: Privacy  Governance\nModule 3: Applicable laws and regulations\nModule 4: Data assessments\nModule 5: Policies\nModule 6: Data subject rights\nModule 7: Training and awareness\nModule 8: Protecting personal information\nModule 9: Data breach incident plans\nModule 10: Monitoring and auditing program performance\n\n \nClass materials include: \n\nTwo full days of training\nElectronic and hardcopy version of the textbook and participant guide\nA 1-year IAPP membership with first class (applied to renewal for current IAPP members)\nVoucher to sit for the certification exam\nVoucher for a Certification Study Group*\nOptional refresher course should you fail the IAPP exam **\n\n\n* Certification Study Group voucher must be used within three months of taking the course. \n** The IAPP exam must be taken within three months of the release of the exam. Refresher course must be taken within three months of completing the IAPP exam. \n*** 1 Year Membership valid with first course taken with Privacy Ref
URL:https://instituteofprivacydesign.org/event/privacy-program-management-cipm-3/
LOCATION:Hybrid (Online & In-Person)
CATEGORIES:#privacytraining,#CIPM
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240627T120000
DTEND;TZID=America/New_York:20240627T130000
DTSTAMP:20260406T120222
CREATED:20240605T213332Z
LAST-MODIFIED:20240605T213637Z
UID:6760-1719489600-1719493200@instituteofprivacydesign.org
SUMMARY:Design Process Standard Deep Dive | Privacy Engineering & Technology Education Discussion (PETed)
DESCRIPTION:Join our IOPD Privacy Engineering & Technology Education Discussion (PETed) Series! The format of the webinar will be a recorded 10-minute introduction followed by a 40-minute informal discussion and interaction with members of the IOPD. The goal will be a discussion on how to solve a specific privacy problem or privacy related resource topic and the latest implementation techniques for some of the biggest challenges like synthetic data\, zero-knowledge proofs\, homomorphic encryption\, and translucent databases. \nThe participants will be asked to bring questions related to the topic. Come back the fourth Thursday of every month for a new discussion\, new speaker\, and new insights on the most cutting-edge privacy challenges! \n  \nDate & Time:\nJune 27\, 2024 @ 12:00 PM EDT / 6:00 PM CEST \n  \nTopic:\nDesign Process Standard Deep Dive \n  \nSynopsis:\nIOPD President R Jason Cronk welcomes you to ask all your burning questions about the Design Process Standard published last year. The need for this standard is a culmination of several factors\, and details the components necessary in a design process to incorporate privacy considerations and reduce privacy risks to individuals. The process could be the design of products\, services or business processes and spans the lifecycle from ideation to deployment. This standard covers privacy and is not limited to “data protection” or any specific jurisdictional approach. Privacy is a broader concept than data protection and covers all interactions between individuals and others in society and the social norms governing those interactions. This standard is purposefully ambiguous in that regards. \n  \nProblem Statement:\nPrivacy by design is an international concept that has been promoted by regulators worldwide and has been adopted into laws and regulations. Until now\, it has been ‘squishy’\, hard to define\, and difficult to implement. \n  \nPre-Discussion Resources:\n\nDesign Process Standard V. 1.0\nDesign Process Standard Launch Webinar Recording\n\n  \nSpeaker:\nR Jason Cronk \nWith over two decades of experience in principle and trust consultancy\, Jason Cronk is a seasoned privacy engineer\, developer\, author of the IAPP textbook “Strategic Privacy by Design\,” Privacy Engineering Section Leader at the IAPP\, and founder and president of the Institute of Operational Privacy Design. His knowledge and involvement reaches across the spectrum as an active member of the academic\, engineering\, legal and professional privacy communities and a pioneering voice in the development of privacy by design. \n  \nModerator:\nJanelle Hsia \nJanelle Hsia is the President and Founder of Privacy SWAN Consulting working as a trainer\, consultant\, and trusted advisor for strategic and tactical decision-making. While she is focused on the field of privacy and data protection\, Janelle Hsia is not a lawyer and brings a diverse background with strong leadership\, technical\, and business skills spanning 20 years in the areas of project management\, IT\, privacy\, security\, data governance\, and process improvement. Janelle Hsia is also Co-Founder and Vice-President of the Institute of Operational Privacy Design. \n  \nThe IOPD Privacy Engineering & Technology Education Discussion (PETed) Series is a members-only event. Join as an Ambassador before the 1st of each month to get invited to this month’s event! Please reach out to a current member to be invited as a guest. If you are already a member\, subscribe to our PETed Mailing List for announcements and monthly invitations!
URL:https://instituteofprivacydesign.org/event/design-process-standard-deep-dive-privacy-engineering-technology-education-discussion-peted/
LOCATION:https://iopd.whereby.com/peted-discussion
CATEGORIES:PETed
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/05/1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240710
DTEND;VALUE=DATE:20240808
DTSTAMP:20260406T120222
CREATED:20240122T203650Z
LAST-MODIFIED:20240502T194255Z
UID:5760-1720569600-1723075199@instituteofprivacydesign.org
SUMMARY:Q3 2024 Strategic Privacy by Design Online Course
DESCRIPTION:Dive into Privacy Design!\nThis course is offered as an introduction to the concepts of strategic privacy by design over 4 – 5 weeks. Each week you will be provided new material to be done at your own pace including: \n\nInteractive Lessons\nOnline Coursework\nQuizzes\nSupplementary Reading Material\nWeekly Live Instructor Review of Group Assignment\n\n\nExpect to put in approximately 5-8 hours of study time per week:\n\n3-6 in self-study\n1 in team assignment\n1 in instructor review\n\n  \nEarly Bird Discount: Train for only $520 when you register before June 19th\, 2024!
URL:https://instituteofprivacydesign.org/event/q3-2024-strategic-privacy-by-design-online-course/
LOCATION:Virtual
CATEGORIES:#privacytraining,#spbd
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/Privacy-by-Design-Training-Blue-4.png
ORGANIZER;CN="Enterprivacy Consulting Group":MAILTO:rjc@enterprivacy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240715T090000
DTEND;TZID=America/New_York:20240716T160000
DTSTAMP:20260406T120222
CREATED:20240520T153600Z
LAST-MODIFIED:20240520T165952Z
UID:6633-1721034000-1721145600@instituteofprivacydesign.org
SUMMARY:Artificial Intelligence Governance (AIGP)
DESCRIPTION:This training teaches critical artificial intelligence governance concepts that are also integral to the AIGP certification exam. While not purely a “test prep” course\, this training is appropriate for professionals who plan to certify\, as well as for those who want to deepen their AI governance knowledge. Both the training and the exam are based on the same body of knowledge. \nWHAT YOU WILL LEARN: \nAIGP training teaches how to develop\, integrate and deploy trustworthy AI systems in line with emerging laws and policies. The curriculum provides an overview of AI technology\, survey of current law\, and strategies for risk management\, among many other relevant topics. \nMODULES: \n\nModule 1: Foundations of artificial intelligence\nDefines AI and machine learning\, presents an overview of the different types of AI systems and their use cases\, and\npositions AI models in the broader socio-cultural context.\nModule 2: AI impacts on people and responsible AI principles\nOutlines the core risks and harms posed by AI systems\, the characteristics of trustworthy AI systems\, and the\nprinciples essential to responsible and ethical AI.\nModule 3: AI development life cycle\nDescribes the AI development life cycle and the broad context in which AI risks are managed.\nModule 4: Implementing responsible AI governance and risk management\nExplains how major AI stakeholders collaborate in a layered approach to manage AI risks while acknowledging AI\nsystems’ potential societal benefits.\nModule 5: Implementing AI projects and systems\nOutlines mapping\, planning and scoping AI projects\, testing and validating AI systems during development\, and\nmanaging and monitoring AI systems after deployment.\nModule 6: Current laws that apply to AI systems\nSurveys the existing laws that govern the use of AI\, outlines key GDPR intersections\, and provides awareness of\nliability reform\nModule 7: Existing and emerging AI laws and standards\nDescribes global AI-specific laws and the major frameworks and standards that exemplify how AI systems can be\nresponsibly governed.\nModule 8: Ongoing AI issues and concerns\nPresents current discussions and ideas about AI governance\, including awareness of legal issues\, user concerns\, and AI auditing and accountability issues.\n\n \nCLASS MATERIALS INCLUDE: \n\nTwo full days of training\nElectronic and hardcopy version of the participant guide\nA 1-year IAPP membership with first class (applied to renewal for current IAPP members)\nVoucher to sit for the certification exam\nVoucher for a Certification Study Group*\nOptional refresher course should you fail the IAPP exam **\n\n\n* Certification Study Group voucher must be used within three months of taking the course. \n** The IAPP exam must be taken within three months of completion of the class. Refresher course must be taken within three months of completing the IAPP exam. \n*** 1 Year Membership valid with first course taken with Privacy Ref
URL:https://instituteofprivacydesign.org/event/artificial-intelligence-governance-aigp-3/
LOCATION:Hybrid (Online & In-Person)
CATEGORIES:#privacytraining,#AIGP
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240717T090000
DTEND;TZID=America/New_York:20240718T160000
DTSTAMP:20260406T120222
CREATED:20240520T160656Z
LAST-MODIFIED:20240520T165925Z
UID:6645-1721206800-1721318400@instituteofprivacydesign.org
SUMMARY:European Data Protection (CIPP/E)
DESCRIPTION:The European Data Protection (CIPP/E) encompasses pan-European and national data protection laws\, key data protection terminology and practical concepts concerning the protection of personal data and trans-border data flows. The global gold standard in European data protection certification. \nThe content of the courses is integral to broadening your knowledge\, educating your privacy team\, and put you on the path to obtaining your privacy certifications. \nCourse outline: \n\nModule 1: Data protection laws\nModule 2: Personal data\nModule 3: Controllers and processors\nModule 4: Processing personal data\nModule 5: Data subject rights\nModule 6: Information provision obligations\nModule 7: International data transfers\nModule 8: Compliance considerations\nModule 9: Security of processing\nModule 10: Accountability\nModule 11: Supervision and enforcement\n\n \nClass materials include: \n\nTwo full days of training\nElectronic and hardcopy version of the textbook and participant guide\nA 1-year IAPP membership with first class (applied to renewal for current IAPP members)\nVoucher to sit for the certification exam\nVoucher for a Certification Study Group*\nOptional refresher course should you fail the IAPP exam **\n\n\n* Certification Study Group voucher must be used within three months of taking the course. \n** The IAPP exam must be taken within three months of completion of the class. Refresher course must be taken within three months of completing the IAPP exam. \n*** 1 Year Membership valid with first course taken with Privacy Ref
URL:https://instituteofprivacydesign.org/event/european-data-protection-cipp-e/
LOCATION:Hybrid (Online & In-Person)
CATEGORIES:#privacytraining,#CIPP/E
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
END:VCALENDAR