Privacy by Design: strategically embedded privacy

During the training, you will receive an action plan on how to create a privacy-friendly product, master the technique of designed privacy and be able to make decisions that do not violate user privacy.

 

Time: 14:00-18:00 (СЕТ)

Language: English

Price: 700 EURO

Online

Why is Privacy by Design important?

Compliance.
According to Article 25 of the Regulation, it is necessary to comply with the principles of Privacy by Design (designed privacy). 

Effective PR strategy.
Companies like Apple, Mozilla, DuckDuckGo, Ecosia, Telegram, Bumble, Corona-App (DE), Signal, NextCloud have already succeeded in this. And it really works, because everyone even turns a blind eye to their imperfection in terms of security and advanced technologies. 

Trust and respect for the product.
Compliance with principles is not due to laws, but due to opportunity. After all, only a company can prevent an imbalance, where the person who uses the product has much less power over his personal information than the business.

A winning model.
The GDPR, despite the 30-page guidelines, contains general requirements and advice on what to do, but there is no checklist. Strategic Privacy by Design is a methodology that involves developing a clear plan of action. 

 

During the training you will learn how to:

Privacy by Design: strategically embedded privacy
Identify sources of threats for a company. 
Privacy by Design: strategically embedded privacy
Build and implement Designed Privacy from scratch.
Privacy by Design: strategically embedded privacy
Predict privacy violations.
Privacy by Design: strategically embedded privacy
Use tactics and strategies that mitigate privacy risks.
Privacy by Design: strategically embedded privacy
Calculate the consequences of a violation of privacy for the user.
Privacy by Design: strategically embedded privacy
Create a FAIR (Factor analysis of information risk) risk assessment model.
Privacy by Design: strategically embedded privacy
Create a blueprint and step-by-step guide for applying Engineered Privacy principles to your products and services.

Each step of the model will be worked out in practical exercises on the case. Theory will give logic and understanding, and practice will help develop a habit and learn a step-by-step algorithm for creating a plan. And a nice bonus will be a certificate of completion of the training.

Trainer

R. Jason Cronk CIPP/US, CIPT, CIPM, FIP
Privacy by Design Trainer
Speaker and writer on the subject of Privacy, including presentations at multiple IAPP events, the Privacy and Security Forum, the Intel Security Conference. Guest lecturer at Florida State University and Indiana University. Certified Information Privacy Professional (CIPP/US), Certified Information Privacy Technologist (CIPT), Certified Information Privacy Manager (CIPM)
Details

For whom?

Data Protection Officer
CEO
They make strategic decisions and the fate of the entire project depends on their will.
Главная
CTO, architects
They lay the “foundation” and principles of the system.
dpo 13
Product Owner и Product Manager
They are responsible for the product and its development. 
Краш тесты
Project Manager
Draws up functional and non-functional requirements for the product before development begins.
dpo 10
Business analysts
They make decisions on planning and building processes.
Главная
Data analysts
They work with databases and manage changes.
dpo 14
Inspired by DPO and privacy lawyers
They can influence and motivate privacy changes in the process, product, company.

The Privacy by Design training is suitable for all professionals and managers who are involved in the creation of a new product and its development in the international market.

 


 

The program

🔹  Introduction to Privacy Harms 

🔹  Threat and Risk Modeling 

🔹  Privacy Risk using FAIR 

🔹  Diagramming Privacy Threats 

🔹  Design Strategies & Tactics 

🔹  Mitigating Privacy Risks 

🔹  Design Process 

Sign up












    The course is loading, wait a few seconds