• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

98 Data Privacy courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Certified Wireless Network Administrator and Security Professional - Complete Video Course

4.3(43)

By John Academy

DESCRIPTION: If you are working in company related to wireless technology, the course is the best solution for you. The course illustrates the fundamentals and essentials functions of wireless network technology and helps you to embrace the system efficiently. The course is sectioned into two parts - one is network administration, and another one is about network security. Both the sections help you to achieve a strong command over the technology. The basic concept of Radio Frequency (RF), WLAN security system, Legal system, Encryption Cipers and methods will be discussed in the Wireless Security Professional section. On the other hand, you gain a crystal clear knowledge about Wi-Fi access, MAC, WLAN, troubleshooting in the Network Administration part. The purpose of the bundled course is to help you to accustom with the troubleshooting process and network configuration process of Wireless technology. The course helps you to handle WLAN network securely. ASSESSMENT: * At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. * Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. CERTIFICATION: * After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. * Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. WHO IS THIS COURSE FOR? Certified Wireless Network Administrator (CWNA) - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. REQUIREMENTS Our Certified Wireless Network Administrator (CWNA) - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. CAREER PATH After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Overview of Wireless Communications Overview of Wireless Communications FREE 00:23:00 Communication Fundamentals 00:15:00 Fundamentals of RF Fundamentals of RF 00:07:00 Characteristics of RF 00:17:00 RF Behaviors 00:17:00 Components and Measurements of RF Components and Measurements of RF 00:19:00 dB Mathematics 00:18:00 Math Examples (eNotes) 00:20:00 Noise Floor 00:07:00 RF Signal and Antenna Concepts RF Signal and Antenna Concepts 00:13:00 Antenna Types 00:15:00 Beamforming 00:09:00 IEEE 802.11 IEEE 802.11 00:15:00 802.11i 00:10:00 Spread Spectrum Technologies Course Overview Direct Sequence Spread Spectrum (Part 1) 00:22:00 Direct Sequence Spread Spectrum (Part 2) 00:21:00 WLAN Topologies WLAN Topologies 00:10:00 Distribution Service 00:08:00 Mesh BSS 00:15:00 Wi-Fi Access Wi-Fi Access 00:14:00 Interframe Space (IFS) 00:13:00 MAC Architecture MAC Architecture 00:18:00 Beacon Frames 00:11:00 WLAN Architecture WLAN Architecture 00:17:00 WLAN Controller 00:11:00 WLAN Deployment WLAN Deployment 00:10:00 Network Extension to Remote Areas 00:13:00 Troubleshooting Troubleshooting 00:18:00 802.11 Coverage Considerations 00:17:00 Capacity vs. Coverage 00:19:00 Security Security 00:22:00 Robust Security 00:24:00 Types of Wireless Attacks Types of Wireless Attacks 00:30:00 Intrusion Monitoring 00:08:00 Fundamentals of Site Surveys Fundamentals of Site Surveys 00:16:00 Site Survey Tools Site Survey Tools 00:05:00 Site Survey 00:15:00 PoE PoE 00:09:00 Midspan 00:08:00 High Throughput (HT) High Throughput (HT) 00:11:00 Spatial Multiplexing (SM) 00:12:00 Very High Throughput (HT) Very High Throughput (VHT) 00:18:00 BYOD BYOD 00:19:00 Over the Air Management 00:10:00 WLAN Security Overview WLAN Security Overview and Data Privacy 00:58:00 Networking Basics 00:04:00 Web GUI Introduction 00:05:00 Security Options 00:03:00 Legacy Security Legacy Security 00:32:00 VPNs 00:21:00 Security Association 00:09:00 MAC Spoofing 00:07:00 Encryption Ciphers and Methods Encryption Ciphers and Methods 00:19:00 TKIP 00:26:00 CCMP 00:20:00 Encryption Examples 00:06:00 802.11 Authentication Methods 802.11 Authentication Methods 00:26:00 802.1X 00:20:00 EAP 00:25:00 Certified Authority Server Credentials 00:06:00 Dynamic Encryption Key Generation Dynamic Encryption Key Generation 00:21:00 Authentication and Key Management 00:13:00 RSNA Key Hierarchy 00:12:00 EAP 00:05:00 Information Elements 00:06:00 SOHO 802.11 Security SOHO 802.11 Security 00:26:00 Cracking Hashes 00:09:00 Cracking Hashes 00:09:00 Fast Secure Roaming Fast Secure Roaming 00:24:00 PMKSA 00:29:00 FT Key Hierarchy (e-notes) 00:30:00 802.11K-2008 00:28:00 Wireless Security Risks Wireless Security Risks 00:22:00 Authentication Attacks 00:20:00 Rogue Devices 00:04:00 Public Hotspots 00:06:00 Wireless LAN Security Auditing Wireless LAN Security Auditing 00:28:00 Wireless Security Monitoring Wireless Security Monitoring 00:21:00 Device Tracking 00:17:00 VPNs, Remote Access and Guest Access Services VPNs, Remote Access and Guest Access Services 00:23:00 Remote Access 00:14:00 WLAN Security Infrastructure WLAN Security Infrastructure 00:37:00 Management Protocols 00:23:00 Other RADIUS Solutions 00:15:00 Wireless Security Policies Wireless Security Policies 00:17:00 Other Policies 00:14:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

Certified Wireless Network Administrator and Security Professional - Complete Video Course
Delivered Online On Demand
£24

Pension, Employment Law & Tax Accounting Diploma

By NextGen Learning

[Updated, June 2023] Pensions support over 14 MILLION people in the United Kingdom. Those who manage, regulate, or provide governance for pension schemes face unique financial and societal challenges. Pensions scheme governance and management training are thus critical to ensuring pension funds are properly managed. Our pension course is designed to increase your knowledge and provide a comprehensive understanding of the UK pension system. This course provides world-class training to improve your knowledge and skills, whether you are a pension fund manager, investor, regulator, or trustee. Pensions are essential for ensuring that we maintain the same quality of living when we retire, allowing our years of hard work to pay off finally. But if you are not well versed in the laws and regulations around their schemes and your rights, you can be scammed of your money. Since so many people depend on pensions in the UK, chances are you will also receive them. So it would help if you understood how the UK pension system works. This course will teach you everything you need to know about pension and personal finance. So why wait? Enrol right away! What will make you stand out? On completion of this online Pension, Employment Law & Tax Accounting Diploma course, you will gain: * CPD QS Accredited * After successfully completing the Course, you will receive a FREE PDF Certificate as evidence of your newly acquired abilities. * Lifetime access to the whole collection of learning materials. * The online test with immediate results * You can study and complete the Pension, Employment Law & Tax Accounting Diploma course at your own pace. Study the Pension, Employment Law & Tax Accounting Diploma course using any internet-connected device, such as a computer, tablet, or mobile device. The substantial Pension, Employment Law & Tax Accounting Diploma is designed to help you demonstrate the preliminary to in-depth level of learning regarding this topic. Moreover, you will be provided with the most knowledgeable and informative modules for your lifetime by enrolling in this course just once. Furthermore, as you proceed through the modules of this course, you will discover the fundamentals of Pension and explore the key topics. Therefore, reinforce your knowledge and furnish your skills by enrolling in our course. Take one step closer to achieving your goal. Show off your new skills with a certificate of completion Once you complete the Pension, Employment Law & Tax Accounting Diploma course, you will be eligible to request a digital certificate for free. For Printed Transcript & Hardcopy Certificate- * 4.99 GBP (Inside the UK Postal Fee) * 8.99 GBP (International Delivery Fee) CPD 10 CPD hours / points Accredited by CPD Quality Standards MODULE 01: OVERVIEW OF THE UK PENSION SYSTEM 08:33 * 1: Overview of the UK Pension system Preview 08:33 MODULE 02: TYPE OF PENSION SCHEMES 10:52 * 2: Types of Pension Schemes 10:52 MODULE 03: REGULATION 18:38 * 3: Regulation 18:38 MODULE 04: FUND GOVERNANCE 13:23 * 4: Fund Governance 13:23 MODULE 05: LAW AND REGULATION OF PENSIONS IN THE UK 11:12 * 5: Law and Regulation of Pensions in the UK 11:12 MODULE 06: KEY CHALLENGES IN UK PENSION SYSTEM 09:52 * 6: Key Challenges in UK Pension System 09:52 ASSIGNMENT (OPTIONAL) - PENSION 03:00 * 7: Assignment On Pension 03:00 PDF COURSE 02: TAX ACCOUNTING 2:49:51 * 8: Module 01 UK's Tax Structure and Management 17:48 * 9: Module 02 Individual Taxation 12:35 * 10: Module 03 National Insurance Basics 07:43 * 11: Module 04 Procedure for Filing a Self-Assessment Tax Return 06:36 * 12: Module 05 Essentials of Income Tax 16:51 * 13: Module 06 Advanced Topics in Income Tax 24:13 * 14: Module 07 Pay As You Earn, Payroll and Salary 14:42 * 15: Module 08 Tax on Capital Gain 15:17 * 16: Module 09 Understanding VAT 16:20 * 17: Module 10 Taxation for Businesses 11:38 * 18: Module 11 Tax on Inherited Wealth 18:29 * 19: Module 12 Financial Analysis and Managerial Accounting 07:39 COURSE 03: EMPLOYMENT LAW UK 3:15:29 * 20: Module 01 Introduction to Employment Law 16:17 * 21: Module 02 Legal Hiring Methods 23:35 * 22: Module 03 Employment Work Contracts 14:06 * 23: Module 04 Staff Guidebook 13:03 * 24: Module 05 Corrective Actions Procedure 13:55 * 25: Module 06 National Base Pay & Living Wage 21:57 * 26: Module 07 MaternityPaternity Rights, Illness Benefits and Retirement Plan 27:28 * 27: Module 08 Bias & Discrimination in the Workplace 27:43 * 28: Module 09 Workplace Health & Safety 09:35 * 29: Module 10 Termination, Complaints and Work Tribunals 20:51 * 30: Module 11 Workplace Surveillance and Data Privacy 06:59 WHO IS THIS COURSE FOR? Is This Pension, Employment Law & Tax Accounting Diploma Course the Right Option for You? This course is recommended for anyone who is interested in learning more about this topic. You'll learn the fundamental ideas and gain a comprehensive understanding of the topic by taking this Pension, Employment Law & Tax Accounting Diploma course. REQUIREMENTS Without any formal requirements, you can delightfully enrol in this Pension, Employment Law & Tax Accounting Diploma course. CAREER PATH After completing this course, you will have the knowledge and skills to explore trendy, in-demand jobs, such as; * Pension Advisor * Pension Administrator * Pension Specialist * Pension Adviser FTC * Associate Pension Consultant * Employment Law Solicitor * Employee Benefits Consultant * Payroll and Benefits Administrator These career opportunities can provide you with a salary range of £35,000- £70,000.

Pension, Employment Law & Tax Accounting Diploma
Delivered Online On Demand
£12

AML, KYC, CDD for Financial Investigator & Business Managers

By NextGen Learning

In an era where the financial landscape is rapidly evolving, the importance of stringent monitoring and compliance cannot be overemphasised. The surge in global transactions has led to a significant rise in opportunities for financial investigation. The industry's robust growth has amplified the demand for experts skilled in AML, KYC for Financial Investigators. This surge isn't just a trend; it's a testament to the pivotal position an AML, KYC for Financial Investigator holds in shaping a transparent and secure financial framework. Our "AML, KYC, CDD with Financial Investigation" course is meticulously designed to equip you with the requisite knowledge and skills. Delving deep into the nuances of the Proceeds of Crime Act 2002, the responsibilities of an AML Reporting Officer, and the intricacies of customer due diligence, it promises a holistic understanding. By undertaking this course, you're not just qualifying; you're positioning yourself at the forefront of an industry that values the expertise of an AML, KYC for Financial Investigator. Make an informed decision today and propel your career as an AML, KYC for Financial Investigator to new heights. The Package Exclusively Features the Following Premium Courses: * Course 01: Diploma in Anti-Money Laundering (AML) at QLS Level 5 * Course 02: Know Your Customer (KYC) - CPD Accredited * Course 03: Financial Investigator - CPD Accredited Learning Outcomes: * Foundations: Grasp core anti-money laundering principles to thrive as an AML, KYC for Financial Investigator. * Legal Acumen: Understand key legal provisions vital for an AML and KYC for the Financial Investigator's role. * Risk Management: Master a risk-based approach, ensuring effective AML and KYC compliance. * Customer Insight: Sharpen skills in Customer Due Diligence, fundamental for an AML, KYC for Financial Investigator. * Suspicion Navigation: Identify and address suspicious financial activities, a key responsibility for an AML, KYC for Financial Investigator. * Professional Development: Stay updated with industry trends, ensuring continuous growth as an AML, KYC for Financial Investigator. What will make you stand out? On completion of this AML, KYC for Financial Investigator online course, you will gain: * QLS Endorsement * CPD QS Accredited * Lifetime access to the whole collection of learning materials. * The online test with immediate results * You can study and complete the AML, KYC for Financial Investigator course at your own pace. In our comprehensive course, "AML, KYC, CDD with Financial Investigation," you'll embark on a journey that equips aspiring Financial Investigators with the expertise needed to tackle the complex world of financial compliance. Starting with exploring money laundering techniques and the legal framework established by the Proceeds of Crime Act 2002, you'll gain a solid foundation in AML and KYC regulations. One of the course's key focuses is your role as an AML Reporting Officer and the responsibilities that come with it. You'll learn to implement a risk-based approach, ensuring you can effectively identify and mitigate potential money laundering threats. Central to the curriculum is mastering Customer Due Diligence (CDD) and Know Your Customer (KYC), where you'll gain the skills to assess customer profiles, detect red flags, and maintain meticulous record-keeping practices. With insights into identifying suspicious conduct and transactions and fostering AML awareness and training, this course empowers you to cultivate vigilance within your organisation and excel as a Financial Investigator. Prepare to become a proficient Financial Investigator with expertise in AML, KYC, and CDD as you navigate the intricate world of financial crime prevention. Join us in the AML, KYC for Financial Investigator course, where knowledge is power, and your investigative skills will make a difference. Show Off Your New Skills With a Certificate of Completion: CPD Quality Standard Certificate: Digital certificate - £4.99 CPD Hardcopy Certificate (FREE UK Delivery) Hard copy certificate - £9.99 Hardcopy Transcript: £9.99 Quality Licence Scheme Endorsed Certificate of Achievement: Upon successful completion of the Gardening (Garden Design) course, you will be eligible to order QLS Endorsed Hardcopy Certificate titled 'Diploma in Anti Money Laundering (AML) at QLS Level 5'. * £109 GBP for addresses within the UK. Please note that delivery within the UK is free of charge. Please Note: NextGen Learning is a Compliance Central approved resale partner for Quality Licence Scheme Endorsed courses. CPD 150 CPD hours / points Accredited by CPD Quality Standards MODULE 01: INTRODUCTION TO MONEY LAUNDERING 06:37 * 1: Introduction to Money Laundering Preview 06:37 MODULE 02: PROCEEDS OF CRIME ACT 2002 10:34 * 2: Proceeds of Crime Act 2002 10:34 MODULE 03: DEVELOPMENT OF ANTI-MONEY LAUNDERING AML REGULATION 10:38 * 3: Development of Anti-Money Laundering AML Regulation 10:38 MODULE 04: RESPONSIBILITY OF THE MONEY LAUNDERING AML REPORTING OFFICER 10:11 * 4: Responsibility of the Money Laundering AML Reporting Officer 10:11 MODULE 05: RISK-BASED APPROACH 11:19 * 5: Risk-based Approach 11:19 MODULE 06: CUSTOMER DUE DILIGENCE 11:57 * 6: Customer Due Diligence 11:57 MODULE 07: RECORD KEEPING 08:04 * 7: Record Keeping 08:04 MODULE 08: SUSPICIOUS CONDUCT AND TRANSACTIONS 11:37 * 8: Suspicious Conduct and Transactions 11:37 MODULE 09: AML AWARENESS AND TRAINING 09:30 * 9: AML Awareness and Training 09:30 ASSIGNMENT - ANTI MONEY LAUNDERING (AML) - (OPTIONAL) 03:00 * 10: Assignment On Anti Money Laundering (AML) 03:00 PDF COURSE 02: KNOW YOUR CUSTOMER (KYC) 1:20:41 * 11: Module 1 KYC Basics 19:47 * 12: Module 2 Understanding Customer Due Diligence 12:04 * 13: Module 3 Exploring Anti-Money Laundering 16:15 * 14: Module 4 Navigating UK Data Privacy and Compliance in KYCAML 11:29 * 15: Module 5 Regulatory Adherence for Businesses 11:50 * 16: Module 6 KYCAML Implementation and Future Directions 09:16 COURSE 03: FINANCIAL INVESTIGATOR 1:08:40 * 17: Module 1 Financial Investigator An Introduction 13:01 * 18: Module 2 Getting Started with Financial Investigation 07:23 * 19: Module 3 Key Traits of Financial Crimes 07:40 * 20: Module 4 Types of Financial Crimes 12:14 * 21: Module 5 Formulating a Financial Crime Response Strategy 10:13 * 22: Module 6 Evidence Handling in Financial Investigations 07:30 * 23: Module 7 Legal Protections Against Financial Fraud 10:39 ORDER CPD QUALITY STANDARD CERTIFICATE (OPTIONAL) 01:00 * 24: CPD Quality Standard certificate 01:00 PDF ORDER YOUR QLS ENDORSED CERTIFICATE (OPTIONAL) 01:00 * 25: QLS Endorsed Certificate (Optional) 01:00 PDF WHO IS THIS COURSE FOR? This course, "AML, KYC for Financial Investigator," is tailored for: * Aspiring Financial Investigators seek to build AML, KYC, and CDD expertise. * Compliance professionals are seeking a comprehensive understanding of AML regulations. * Banking and financial sector employees aiming to enhance their anti-money laundering knowledge. * Legal professionals are interested in the financial aspects of a criminal investigation. * Government officials and law enforcement personnel are involved in financial crime prevention. * Anyone keen to develop a strong foundation in AML, KYC, and CDD for a career in finance or investigations. REQUIREMENTS Without any formal requirements, you can delightfully enrol in this AML, KYC for Financial Investigator course. Study for the AML, KYC for Financial Investigator course using any internet-connected device, such as a computer, tablet, or mobile device. CAREER PATH This AML, KYC for Financial Investigator bundle will lead you to many different career opportunities, here are few prospects * AML Compliance Officer * Business Manager * KYC Analyst * Financial Investigator * Compliance Manager * Fraud Analyst * AML Trainer/Educator * Risk Assessment Specialist * Compliance Consultant * Accountant

AML, KYC, CDD for Financial Investigator & Business Managers
Delivered Online On Demand
£12

General Data Protection Regulations

5.0(3)

By Magpie Training

This course covers the principles of GDPR.  Everyone responsible for using personal data has to follow strict rules called 'data protection principles'. 

General Data Protection Regulations
Delivered in-person, on-requestDelivered In-Person in Consett
£18

Data Protection Level 3 and Data Security (GDPR) Training Certification

5.0(2)

By Studyhub UK

OVERVIEW The Data Protection Level 3 and Data Security (GDPR) Training Certification course provides a comprehensive understanding of GDPR regulations and the fundamentals of data protection and security. It covers GDPR basics, lawful basis for data processing, rights and breaches, as well as the responsibilities and obligations related to data protection. LEARNING OUTCOMES: * Develop a solid understanding of GDPR regulations and their implications for data protection and security. * Gain knowledge of the lawful basis for processing personal data in compliance with GDPR requirements. * Understand the rights of individuals and how to handle data breaches effectively. * Identify and fulfill the responsibilities and obligations placed on organizations regarding data protection. * Acquire practical skills and strategies to ensure compliance with GDPR regulations and maintain data security. WHY BUY THIS DATA PROTECTION LEVEL 3 AND DATA SECURITY (GDPR) TRAINING CERTIFICATION? 1. Unlimited access to the course for forever 2. Digital Certificate, Transcript, student ID all included in the price 3. Absolutely no hidden fees 4. Directly receive CPD accredited qualifications after course completion 5. Receive one to one assistance on every weekday from professionals 6. Immediately receive the PDF certificate after passing 7. Receive the original copies of your certificate and transcript on the next working day 8. Easily learn the skills and knowledge from the comfort of your home CERTIFICATION After studying the course materials of the Data Protection Level 3 and Data Security (GDPR) Training Certification you will be able to take the MCQ test that will assess your knowledge. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. WHO IS THIS COURSE FOR? This Data Protection Level 3 and Data Security (GDPR) Training Certification does not require you to have any prior qualifications or experience. You can just enrol and start learning.  PREREQUISITES This Data Protection Level 3 and Data Security (GDPR) Training Certification was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. CAREER PATH As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This Data Protection Level 3 and Data Security (GDPR) Training Certification is a great way for you to gain multiple skills from the comfort of your home. COURSE CURRICULUM Data Protection Level 3 and Data Security (GDPR) Training Certification GDPR Basics 00:22:00 GDPR Explained 00:17:00 Lawful Basis for Preparation 00:29:00 Rights and Breaches 00:25:00 Responsibilities and Obligations 00:29:00 Mock Exam Mock Exam - Data Protection Level 3 and Data Security (GDPR) Training Certification 00:20:00 Final Exam Final Exam - Data Protection Level 3 and Data Security (GDPR) Training Certification 00:20:00

Data Protection Level 3 and Data Security (GDPR) Training Certification
Delivered Online On Demand
£10.99

The GDPR Primer for Data Protection Officers

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for A prior understanding of EU Data Protection legislation is recommended. Candidates are typically management professionals and decision-makers who already have responsibility for data protection compliance within their organisation.Co-Requisite Subjects Candidates should have a good understanding of their own organisation?s data management activities through the life cycle from initial acquisition, through the various areas of processing and usage, to eventual removal or destruction. Overview To equip the learner with a foundational understanding of the principles of the General Data Protection Regulation (GDPR) and to provide constructive suggestions on implementing compliant processes. THE SOCIAL, HISTORICAL AND LEGAL BACKGROUND LEADING TO THE GENERAL DATA PROTECTION REGULATION (GDPR) * The scope and global context of the GDPR * The key concepts within the GDPR * The definition of all key words and phrases relating to this Data Protection regulation PRINCIPLE ONE: THE CRITERIA GOVERNING FAIR, OPEN AND TRANSPARENT PROCESSING OF PERSONAL DATA * Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes * * Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. * Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes * * Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. * * Principle Four: Ensuring that any personal data held by the organisation is kept accurate and current, and that any processing of such data is appropriate * * Principle Five: Management and storage of personal data in a manner that meets regulatory obligations, while minimising the time that the individual remains identifiable * * Principle Six: The criteria governing safe, secure and confidential processing of personal data in order to protect its integrity * * Principle Seven: The key roles, responsibilities and accountabilities of those involved in Data Management within an organisation * Establishment within a single Member State * Joint Controllers * Privacy by Design and by Default * Nominated Representatives * Third-party Contracts and shared liability * Logging of data management processes * Data Breach Notification obligations * Privacy Impact Assessments * Overseas transfer of personal data * * L2.8 The Data Subject Rights, and their implications for the Data Controller and the Data Processor * * L2.8.1 The ?right to be forgotten? * L2.8.2 The right to restriction of processing * L2.8.3 The right to object to certain processing * L2.8.4 The right to have inaccurate data amended or erased * L2.8.5 The right to data portability * L2.8.6 The right of access to one?s personal data * L2.8.7 Rights in relation to automated decision-making and profiling THE ROLE OF THE DATA PROTECTION OFFICER (DPO) * The role of the Data Protection Officer (DPO) * Criteria for designating a DPO * Tasks of the DPO * Position of the DPO within the organisation * * The role of the Supervisory Authority within the Member State * * The Lead Supervisory Authority and independence * Investigative, corrective and advisory powers * Independence of the Supervisory Authority * Collaboration with other Supervisory Authorities * Codes of Conduct and Certification * * The role, powers and tasks of the European Data Protection Board (EDPB) THE REMEDIES, LIABILITIES AND PENALTIES AVAILABLE UNDER THE GDPR * Right to raise a complaint * Right to representation * Right to effective judicial remedy * Right to compensation and liability * Administrative fines of up to ?10m or 2% of GAT * Administrative fines of up to ?20m or 4% of GAT PROVISIONS FOR SPECIFIC PROCESSING SITUATIONS * Freedom of Expression * Processing of official documents * Processing of National Identification Numbers * Processing regarding employment * Processing for archiving purposes * Processing under obligations of official secrecy * Processing of data by religious organisations PREPARING FOR IMPLEMENTATION OF THE GDPR * Review of data management policies and procedures * Review of data assets and security structures * Training and Awareness-raising * Data management governance structures * Embedding Privacy By Design and Default * Codes of Conduct and Certification against standards * Breach detection and notification procedures * Review of third-party agreements, contracts

The GDPR Primer for Data Protection Officers
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified Information Privacy Technologist (CIPT)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialist Anyone who builds and develops IT systems Overview Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to preempt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal The Principles of Privacy in Technology training is the how to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. The training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Technologist (CIPT) certification program. FUNDAMENTALS OF INFORMATION PRIVACY * Reviewing the modern history of privacy * Foundational privacy concepts * Data protection roles and fair information practices * Exploring the impacts of privacy and data protection regulations on information management PRIVACY IN THE IT ENVIRONMENT * Compliance requirements * IT risks * Stakeholder privacy expectations * Differentiating between privacy and security CORE PRIVACY CONCEPTS * Foundational elements for embedding privacy in IT * Common privacy principles * Data protection by design and default PRIVACY CONSIDERATIONS IN THE INFORMATION LIFE CYCLE * Privacy considerations throughout the stages of the information life cycle PRIVACY IN SYSTEMS AND APPLICATIONS * Examining the risks inherent in the IT environment and options for addressing them * Identity and access management * Credit card information and processing * Remote access * BYOD and telecommuting * Data encryption * Additional privacy-enhancing technologies in the enterprise environment PRIVACY TECHNIQUES * Strengths and weaknesses of authentication techniques * Using identifiers * Privacy by design ONLINE PRIVACY ISSUES * Unique challenges that come from online privacy issues * Laws and regulations * Online threats * Social media * E-commerce * Tracking technologies * Web security protocols TECHNOLOGIES WITH PRIVACY CONSIDERATIONS * Privacy considerations associated with a variety of technologies * Cloud computing * Wireless IDs * Location-based services * ?Smart? technologies * Video/data/audio surveillance * Biometric recognition

Certified Information Privacy Technologist (CIPT)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified Information Privacy Professional (CIPP/US)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. The Certified Information Privacy Professional/United States (CIPP/US) program, developed by the International Association of Privacy Professionals (IAPP) - the world?s largest comprehensive global information privacy community and resource, was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations and understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S., the EU and other jurisdictions.This course will provide you with a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. INTRODUCTION TO PRIVACY * Modern history of privacy * Introduction to personal information * Overview of data protection roles * Summary of modern privacy frameworks STRUCTURE OF U.S. LAW * Structure and sources of U.S. law and relevant terms * Governmental bodies having privacy and information security authority GENERAL DATA PROTECTION REGULATION OVERVIEW (GDPR) * High-level overview of the GDPR * Significance of the GDPR to U.S. organizations * Roles and responsibilities outlined in the law CALIFORNIA CONSUMER PRIVACY ACT OF 2018 (CCPA) * High-level overview of the newly passed California Consumer Privacy Act of 2018 * Scope * Consumer rights * Business obligations * Enforcement ENFORCEMENT OF U.S. PRIVACY AND SECURITY LAWS * Distinguishing between criminal and civil liability * Comparing federal and state authority * Theories of legal liability * Enforcement powers and responsibilities of government bodies, such as the FTC and state attorneys general INFORMATION MANAGEMENT FROM A U.S. PERSPECTIVE * Developing a privacy program * Role of privacy professionals and accountability * Employee training * User preferences * Managing vendors * Data classification FEDERAL VERSUS STATE AUTHORITY * Differences between federal and state authority * Preemption HEALTHCARE * Privacy laws in healthcare * Major components of HIPAA * Development of HITECH * Privacy protections mandated by other significant healthcare laws FINANCIAL PRIVACY * Goals of financial privacy laws * Key concepts of FCRA, FACTA and GLBA * Red Flags Rule, Dodd-Frank and consumer protection laws EDUCATION * Privacy rights and protections under FERPA * Recent amendments provided by PPRA and NCLBA TELECOMMUNICATIONS AND MARKETING * Rules and regulations of telecommunications entities * Laws that govern marketing * Addressing privacy in the digital advertising LAW ENFORCEMENT AND PRIVACY * Privacy laws on intercepting communication * Telecommunications industry and law enforcement * Laws ensuring rights to financial privacy NATIONAL SECURITY AND PRIVACY * Rules and regulations on intercepting communication * Evolution of the law * Collaboration of government agencies and private companies to improve cybersecurity CIVIL LITIGATION AND PRIVACY * Privacy issues related to litigation * Electronic discovery, redaction and protective orders * U.S. discovery rules versus foreign laws LEGAL OVERVIEW OF WORKPLACE PRIVACY * Federal and state laws regulating and protecting employee privacy * Federal laws prohibiting discrimination PRIVACY BEFORE, DURING AND AFTER EMPLOYMENT * Lifecycle of employee privacy * Background screening * Employee monitoring * Investigating misconduct and termination * Antidiscrimination laws * ?Bring your own device? policies STATE DATA SECURITY LAWS * State laws impacting data security * Social Security number use regulation * Laws governing data destruction DATA BREACH NOTIFICATION LAWS * Scope of state data breach notification law * Nine elements of state data breach notification laws * Major differences in state laws

Certified Information Privacy Professional (CIPP/US)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Educators matching "Data Privacy"

Show all 13