Assessing the impact of Data Protection by Design Training: All you need to know
This Assessing Data Protection by Design training course covers All you need to know, about Data Protection Impact Assessments and Privacy by Design whatever your experience or knowledge is.
Data Protection by design course overview
Companies are encouraged to implement technical and organisational measures, at the earliest stages of the design of the processing operations, in such a way that safeguards privacy and data protection principles right from the start (‘data protection by design’). By default, companies should ensure that personal data is processed with the highest privacy protection so that by default personal data isn’t made accessible to an indefinite number of persons (‘data protection by default’). Eurpoean Commission.
Who should attend?
This course is for any professional looking for course knowledge for privacy by design and data protection impact assessments. Delegates would include Data Protection Officers, Privacy Officers, Information Governance Professionals, Information Management professionals and their deputies or anyone working in a role that requires these skill sets.
|9.15 to 9.30||Welcome Aims & Objectives for the course|
|9.30 to 10.00||Section A - Privacy by Design as a Concept
Data Lifecycle approach
Data Flow approach
Privacy by Design principles
Incorporating controls by design into any new or existing systems or processes
Formally documenting methods for introducing new processes or changing existing ones
|11.30 to 11.45||Refreshments Break|
|Section B - Obligations and its role in design
Data Protection by Design vs Default
Data Breach Management and reporting obligations
Privacy Impact Assessments
Common privacy risks within an organisation
Finding compliance gaps in the practices and procedures
Safeguarding systems and practices
Conducting privacy audits
|13.15 to 14.00||Lunch|
|14.00 to 15.00||Section C - IA in detail as a route to PbD
Risk Management approach
Risks to who?
Privacy Impact Assessments (PIA) vs DPIA
PTA, Utilizing scalable PIAs in practice
Mapping data flows in projects and systems, modelling risks
Ethics and Bias in algorithms
PETS and other Privacy/Security tools
Building PIAs into SDLC and procurement lifecycle
Referral to a Supervisory Authority
|15.00 to 15.15||Refreshment Break|
|15.15 to 16.15||Section D - Privacy Risk Management
When resources are low – Risk is key
PDCA – the wheel never stops turning
Internal Audit, Management Review and Corrective Action – evidencing improvement
Who are they and what do they do?
Honesty about who you are
|16.15 to 16.30||Close and finish time|
Data Protection by design Classroom Training
We offer Inhouse Training scroll down below for further information
Our expert trainers provide specialist training for your employees within your company either face to face or virtually. Oue virtual platform has been increasingly popular with our clients, as it reduces the cost for trainer travelling expenses and would also reduce your companies carbon footprint. All delegates will be able to see their trainer and fellow delegates as you would in a meeting room and talk to them live.
We offer our services through a number of cost effective packages, (Platinum, Gold, Silver and Bronze) for as little as 6 employees to 15 employees per training session.
If you did not find the course you are looking please contact us and we can discuss and design the right course for you. For a no obligation quote, email email@example.com or call Sharon, Client Relationship Manager on 07593 438646 or 01206 807267