Webinar on Privacy by Design

 

 

Embedding the principles of designed privacy can be the most effective solution, for example, when creating a mobile application. And, probably, Maria Arnst CIPM, TÜV, Strategic Privacy by Design will be able to infect you with love for this topic at a webinar about the consequences of violations of Privacy by Design (on cases of well-known brands).

 

 

25.02 16:00 Free

 

Data

 

Time

(GMT+3)

 

Price

The GDPR requirements are quite abstract. Especially when we talk about the concept of Privacy by Design, set out in Article 25 of the Regulations. Do you often enter privacy requirements or coordinate them in the terms of reference for creating an IT product where you plan to process personal data? At the same time, what laws, norms, and examples do you focus on: GDPR, EDPB or other supervisory authorities ' guidelines on embedded privacy, Anna Kavukyan's 7 Principles of Embedded Privacy, or Jason Kroenk's concept?

Do you find it difficult to answer these questions? Perhaps your company violates the requirement of Article 25 of the GDPR, or simply shifts the responsibility for the built-in privacy. But two parties should worry about the issue of privacy: both the processor (developer) and the controller (customer). And, if something is not provided for, there are great risks, up to the point that an employee can download data from a computer and take it home. This is fraught with the preparation of a class action against the company, and in this case, the fines will not even be limited to millions.

 

Who needs to join the webinar?

 

Representatives of small, medium and large companies that order or develop IT, Fintech, Health, and Digital Marketing products. To some extent, you need to adhere to the principles of designed privacy.

In the program:

 

🗹 What is Privacy by Design and why should you be interested in designed privacy?

🗹 What is the model of Jason Kroenk, CIPP/US, CIPT, CIPM, FIP, author of the Strategic Privacy by Design methodology? And why is this one of the most competent approaches?

🗹 What are the types of violations (according to the taxonomy of D. Solove)?

🗹 Analysis of cases where well-known brands have been punished by numerous articles in the media or by supervisory authorities for non-compliance with the principles of designed privacy.

The speaker

Maria Arnst CIPM, TÜV, Strategic Privacy by Design, DPP
Data Protection Officer, GDPR Consultant, Privacy researcher
Certified Information Privacy Manager, member of International Association of Privacy Professionals with experience of being a Data Protection Officer for European companies, including those focused on privacy and data security. Certified as Data Protection Officer by TÜV (Germany's leading and one of the world's leading independent testing and certification services group), trained in Strategic Privacy by Design.

 

When designing privacy (in other words, following the principle of Privacy by Design, which is explained in Article 25 of the GDPR), it is necessary to take into account the risks associated with a particular probability and severity of violation of the rights and freedoms of data subjects. In order to assess these risks, it is necessary to understand what violations can lead to disregard for the principles of Privacy by Design.

 


 

Order

[contact-form-7 404 "Not Found"]
The course is loading, wait a few seconds