Assessing the impact of Data Protection by Design and Data Protection Impact Assessments Training: All you need to know
Our Assessing Data Protection by Design training course covers all you need to know, whatever your experience or knowledge is.
Assessing the impact of Data Protection by design course overview
Companies are encouraged to implement technical and organisational measures, at the earliest stages of the design of the processing operations, in such a way that safeguards privacy and data protection principles right from the start (‘data protection by design’). By default, companies should ensure that personal data is processed with the highest privacy protection so that by default personal data isn’t made accessible to an indefinite number of persons (‘data protection by default’). Eurpoean Commission.
Who should attend?
This course is for any professional looking for course knowledge for privacy by design and data protection impact assessments. Delegates would include Data Protection Officers, Privacy Officers, Information Governance Professionals, Information Management professionals and their deputies or anyone working in a role that requires these skill sets.
|9.15 to 9.30||Welcome Aims & Objectives for the course|
|9.30 to 10.00||Section A - Privacy by Design as a Concept
Data Lifecycle approach
Data Flow approach
Privacy by Design principles
Incorporating controls by design into any new or existing systems or processes
Formally documenting methods for introducing new processes or changing existing ones
|11.30 to 11.45||Refreshments Break|
|Section B - Obligations and its role in design
Data Protection by Design vs Default
Data Breach Management and reporting obligations
Privacy Impact Assessments
Common privacy risks within an organisation
Finding compliance gaps in the practices and procedures
Safeguarding systems and practices
Conducting privacy audits
|13.15 to 14.00||Lunch|
|14.00 to 15.00||Section C - IA in detail as a route to PbD
Risk Management approach
Risks to who?
Privacy Impact Assessments (PIA) vs DPIA
PTA, Utilizing scalable PIAs in practice
Mapping data flows in projects and systems, modelling risks
Ethics and Bias in algorithms
PETS and other Privacy/Security tools
Building PIAs into SDLC and procurement lifecycle
Referral to a Supervisory Authority
|15.00 to 15.15||Refreshment Break|
|15.15 to 16.15||Section D - Privacy Risk Management
When resources are low – Risk is key
PDCA – the wheel never stops turning
Internal Audit, Management Review and Corrective Action – evidencing improvement
Who are they and what do they do?
Honesty about who you are
|16.15 to 16.30||Close and finish time|
Assessing the impact of Data Protection by design Classroom Training
Who are our Privacy by Design and Data Protection Impact Assessment trainers
Ralph has spent nearly two decades working at the intersection of privacy, security and risk management. He believes good information governance adds business value to achieve business objectives and return on investment.
Debbie is a passionate and motivated information governance professional with more than 34 years’ experience in the Public Sector.
Frank Rankin is an information governance professional with over a quarter of a century of experience in records management, data protection and freedom of information. He has worked in the NHS, central government, local government and higher education sectors
All prices include the attendance of 15 delegates, a course workbook, additional reading, slide handouts, an LTD delegate folder, a pen and a CPD certificate. If booked in advance, we offer a 4 week after care package.
If you did not find the course you are looking please contact us and we can discuss and design the right course for you. For a no obligation quote, email firstname.lastname@example.org or call Sharon our Client Relationship Manager on 07593 438646 or 01206 807267