Strategic Privacy by Design

Workshop by R. Jason Cronk CIPT, CIPM, CIPP/US, FIP by the IAPP, PbD Ambassador, author of the book «Strategic Privacy by Design»
from 18 November to 19 November2019
09:00-16:00
450
EUR
375
EUR
Early bird price (until 31 August)
Minsk / Belarus
Minsk

Description

Strategic Privacy by Design workshop is a two days workshop to help companies build privacy considerations into their product offerings.

Privacy by Design is an international concept championed by regulators and industry alike as a means of building trust into interactions with consumers. Called "data protection by design" by the European Union General Data Protection Regulation (GDPR), privacy by design can be an effective tool for not only regulatory compliance but building better products and services.

The workshop consists of training around the conceptual foundations of Privacy by Design, followed by training on a practical "strategic" process to achieve it. Up to 30 participants per workshop will learn how to identify invasions from a use case and then strategies and tactics to mitigate those issues. The course has been approved for 5.5 CPE credits towards CIPT/CIPM certifications.

More
Hide

Trainer

R. Jason Cronk CIPP/US, CIPT, CIPM
R. Jason Cronk
CIPT (Certified Information Privacy Technologist), CIPM (Certified Information Privacy Manager), CIPP/US (Certified Information Privacy Professional/United States), Privacy by Design Ambassador, Juris Doctor, FIP (Fellow of Information Privacy) by the International Association of Privacy Professionals.

With more than twenty years of experience in the Information Technology industry and as a licensed attorney in Florida, Robert Jason Cronk is a creative and analytical thinker, able to traverse the realms of business, law, and technology.

In 2004, while working in the information security department of Verizon, Mr. Cronk decided to make his long standing personal interest in information privacy a career choice. In 2006, he entered Florida State University School of Law where he focused his research on privacy law issues, including authoring a white paper on the intersection of privacy and public records for the Florida First Amendment Foundation.

After graduating, with honors, he earned his CIPP/US, was admitted to practice in Florida and has become an active member of the privacy professional’s community through his involvement in the International Association of Privacy Professionals. He has since been awarded the CIPT, CIPM and FIP by the IAPP.

Mr. Cronk is a noted speaker and writer on the subject of Privacy, including presentations at multiple IAPP events, the Privacy and Security Forum, the Intel Security Conference and guest lectures at Florida State University and Indiana University.

Interpretation by Siarhei Varankevich

Co-Founder & CEO of Data Privacy Office LLC. Data Protection Trainer and Principal Consultant
MBA, Certified Information Privacy Professional (CIPP/E), Certified Information Privacy Manager (CIPM). Siarhei has been working with GDPR from 2015 (draft version) in Munich and defended his MBA thesis about Regulation in Bremen in 2016

Siarhei delivered hundreds of consultations on GDPR issues to companies around the world. He helped to implement the GDPR program as an external project manager in over 50 companies.

After the course you can answer the following questions

privacy student
How to identify threatening actors?
How to construct a privacy model from scratch?
privacy student
privacy student
How to identify potential privacy invasions?
What strategies and practices can be used to mitigate privacy risks?
privacy student
privacy student
What are the consequences of privacy breaches for individuals?
How to develop a privacy risk model based on FAIR (Factor analysis of information risk)?
privacy student
privacy student
How to apply the design process to real-world examples?

Program

This two days class turns privacy professionals into Privacy by Design professionals. Four sessions take you through the all the elements necessary for including Privacy by Design in your products, services and processes.

Session 1 – Building a model: Actors and violations
Participants will be introduced to the concept of Privacy by Design and will then learn how to identify threatening actors and potential privacy invasions.
Session 2 – Controls: Architecture, Strategies and Tactics
This session will examine the controls available to mitigate privacy risks. Participants will first examine the architecture of the system and its role in creating privacy-friendly processes. Then there will be a systematic review of the strategies and tactics that can be used.
Session 3 – Privacy Risk Analysis
Participants will discuss the consequences of privacy breaches for individuals. This will be used to develop a privacy risk model based on FAIR, the information risk factor analysis.
Session 4 – The Design Process
In this session, all the elements will be brought together in a cohesive process to design a privacy-friendly system, secure data, supervise data use and balance individual interests and organizational activities. Participants will have the opportunity to apply the design process to real-world examples.
The Privacy by Design Card game
As time and spacing permits we finish our course with the Privacy by Design Card game incorporates all the elements taught during the class. We will play several rounds of the game to help reinforce the concepts in a fun environment.

Feedback

Mr. Cronk is an engaging and deeply knowledgeable speaker and was able to explain complicated concepts in terms that made them simple and resonated with his audience. His thought-provoking material helped people reframe their thoughts through the day. In addition, his card was really good tool and enjoyable.

– Simon Clark

The course chellenged our preconseptions, there were great insights into how technology brings both opportunities and threats to the privacy of our customers and internal users. The focus on real world examples in an interactive group environment meant we could share ideas with privacy professionals from different backgrounds and learn from Jason as well as each other.

– Richard Poole

More
Hide

Course in brief

4 interesting sessions
World's leading authority on Privacy by Design
8 hours of turning into Privacy by Design professionals
Several rounds of the Privacy by Design card game

Pricing

Standard fee:
450 EUR *
Early bird:
375 EUR *
Save by signing up today!
*Payments both from individuals and corporate clients are accepted.

The price includes

Brief description of the project
Coffee and lunch
Customer
Certificate of Completion
Training venue

We will help you with accommodation!

Given the relevance of our workshop for the entire region, we can find an accommodation in Minsk for you!

Please note that you will pay the costs of logistics and accommodation by YOURSELF. Our task is to assist you with booking.

Certificate on completion

Training is an organizational measure, and is a duty reflected in the General Data Protection Regulation, Articles 24, 25, 28, 32, and 39 (1) b). So, the certificate will be as an approval that you get necessary information and practice in the sphere of Privacy by design.

Gifts

Strategic Privacy by Design Book

Book «Strategic Privacy by Design»

The first IAPP book to get into the details of how privacy by design works, with dozens of sample scenarios, workflows, charts, and tables. Use it as a standalone text to inform your work, or pair it with our CIPM and CIPT textbooks to create a fuller picture of how managing a global privacy program today requires mix of legal knowledge, management skills, and technical acumen.

 

“Jason Cronk’s Strategic Privacy by Design sets forth a clear, comprehensive, and highly practical blueprint for incorporating privacy into design. Cronk deftly explains the dimensions of privacy in a sophisticated way that is enlightening not just to novices but also to seasoned experts. Cronk’s copious use of concrete examples is some of the very best I’ve seen. Well organized and accessible, this book has numerous helpful charts and illustrations. This book is an essential resource for engineers as well as privacy professionals.”

– Prof. Daniel Solove, George Washington University Law School and President of TeachPrivacy.

 “Having created Privacy by Design so many years ago, it is truly heartwarming to see a book dedicated to exploring its application and breadth! Jason has done an excellent job in outlining the value of proactively embedding privacy into the design of one’s operations, in an effort to prevent the privacy harms from arising. Jason’s book will no doubt become a welcome addition in many jurisdictions.”

– Ann Cavoukian, Ph.D., Three-term Information and Privacy Commissioner of Ontario, Canada, Distinguished Expert-in-Residence, Privacy by Design Centre of Excellence, Ryerson University.

 

The book costs $50 at the IAPP website. You will get a copy signed by the author!

Privacy by Design card game

Full Tournament Deck (up to 8 players)

Your goal as a team is to end up with as few privacy violations and consequences as possible. It’s not a game you could mindlessly play you have to keep your wits with you and think strategically about your moves in order to have the upper hand.

  • 122 Playable Cards
  • 47 Information Cards
  • 26 Tactics
  • 33 Violations
  • 16 Consequences
    • 4 non-playable cards (126 total)
    • Dealer card
    • PbD training card

Apply

Sign up