Ultimate Privacy By Design Data Protection Course(Gdpr,Lgpd)

Posted By: ELK1nG

Ultimate Privacy By Design Data Protection Course(Gdpr,Lgpd)
Last updated 5/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.08 GB | Duration: 5h 45m

Learn Privacy by Design Data Protection Methodologies in order to prepare for GDPR,CCPA,LGPD Data Protection compliance

What you'll learn
Privacy by Design
Privacy Interest
Create a Privacy Model
Use a Privacy by Design methodology
Perform Risk An analysis from privacy perspective
Requirements
Understand basic IT and privacy concepts
Understand Basic risk and security concepts
Description
“Lessons from ex IBM, MICROSOFT about how to make privacy operational and how to get 3 privacy certifications in less than 30 days: CIPT v2020, CIPM, CIPP/E by IAPP”––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––-5+ hours video content60+ lessons2021 update––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––-MY FIRST PROMISE TO YOU is the following: You will be prepared to pass 3 IAPP certifications in less than 30 days if you follow the below learning plan:Course 1: Build EU GDPR data protection compliance from scratch (CIPT)Course 2: How to succeed in a Data Privacy Officer Role (GDPR DPO, CIPM)Course 3: GDPR Privacy Data Protection Case Studies Explained (CIPP/E, CIPM, CIPT)Course 4: Ultimate Privacy by Design Guide - step by step strategies with examples (CIPM, CIPT) - we are here!!!Course 5: Build Security Incident Response for GDPR Data Protection (incl. parts from CIPT and CIPM also)Course 6: (part of CIPP/US): California Consumer Privacy Act (CCPA) - Complete course***************************************************************************************************************************************************My name is Roland Costea and after spending my last 8 years working for Microsoft, IBM, Genpact and Cognizant as a Privacy & Security Director being able to create hundreds of integrated security & privacy programmes for top organizations in the world, I have decided to put all my experience together in a comprehensive privacy LEARNING PLAN, to show how to actually make Data Privacy operational and most importantly how to think out of the box.I have been involved in engineering privacy for a lot of industries including Automotive (Mercedes-Benz, Geely, Volvo) and also provided DPO as a service for several other top companies in Europe and US. I have worked and developed the privacy strategy for Microsoft & IBM for the whole Central & Eastern Europe and also drived Cognizant Security & Privacy business in DACH.Certifications I hold: CIPT, CIPM, CISSP, CDPSE, CRISC, CISM, CCSK, CCSP, LPT, CEH, ECSA, TOGAF***************************************************************************************************************************************************Protecting private information has vital and obvious implications for everyday life, and the only way companies can successfully do this is to create a culture of privacy.The only solution – the only way to change people’s behavior – is to embed privacy in the very fabric of the organization. That’s why Privacy by Design, a decades-old application design and development strategy, is now being discussed as a foundational strategy for entire organizations.The original goal of Privacy by Design was developing best practices that ensured application developers were building privacy into their products from the ground up. Even if concern for customer or employee privacy wasn’t the highest priority, there was always profit – it is very expensive to re-engineer privacy into a product following a failure.Today, these best practices are more important than ever. Increasing amounts of data have created an ever-expanding attack surface, and complex new regulations demand a foundational approach to privacy. In fact, Article 25 of the GDPR is titled “Data Protection & Privacy by Design and by Default.”Organizations face an ever-growing number of attack vectors related to privacy, including the internet of things (IoT), government and business data over-collection and unread mobile app permissions such as allowing scanner apps to keep and sell the data they scan.This course is not about the GDPR, CCPA or LGPD in essence, though it can certainly be used as a process for data protection & privacy by design and default (Article 25 of the GDPR regulation). Most probably you are already enrolled in my bestseller “Build EU GDPR from scratch course” which goes for GDPR from all perspectives. This course is not meant to comply with any specific regulation, though use of the correct privacy-by-design process herein will help organizations comply with many regulations. This course is about how to build better processes, products and services that consider individuals’ privacy interest as a design requirement. It is about how to build things that people can trust.There are four sections I have created. Section 2 provides introductory remarks, including an introduction to Ann Cavoukian’s 7 Foundational Principles of Privacy by Design, a short history of regulatory adoption and past challenges that privacy-by-design practitioners have faced. Given its 10-year history in the privacy professionals’ community, many readers may already be familiar with Cavoukian’s principles. This section also contains something most privacy professionals, outside academia, may not be aware of. Here I discuss what I feel is the impetus for why companies must build privacy into their processes, products and services and not rely on individuals’ self-help to protect their own privacy.For those not familiar with the Solove Taxonomy of Privacy or the Hoepman Strategies, most probably the majority of you, Section 3 is a must. The two frameworks form the basis for identifying and mitigating privacy risks in the privacy model developed in that section. Section 4 describes how to analyze the privacy model built in Section 3.In the analysis section, a risk model is built using the Factor Analysis of Information Risk with a focus on individual risks over organizational risks and tweaks in the terms and definitions for privacy beyond information security. Designers may never need to determine privacy risk explicitly but understanding the factors that influence privacy risk provides a deeper understanding of why the process is built the way it is. The last section, Section 5, details the design procedure, while using the other sections as reference

Overview

Section 1: Introduction

Lecture 1 Introduction - Why Privacy by Design is extremely important

Lecture 2 What you will learn in this course?

Lecture 3 IAPP certification learning plan - CIPT, CIPM, CIPP/E

Lecture 4 Powerpoint Presentations for download

Section 2: Privacy by Design generalities and principles!

Lecture 5 How was privacy by design adopted during time!

Lecture 6 Privacy by Design Principle 1

Lecture 7 Privacy by Design Principle 2

Lecture 8 Privacy by Design Principle 3

Lecture 9 Privacy by Design Principle 4

Lecture 10 Privacy by Design - Principles 5, 6 and 7

Lecture 11 Are there any challenges?

Lecture 12 It is extremely important to include privacy from early stages!

Section 3: Let's define a privacy by design Model!

Lecture 13 What is this section about?

Lecture 14 Individuals

Lecture 15 Important Actors

Lecture 16 Links and Relationships

Lecture 17 Privacy by Design - Example 1

Lecture 18 Privacy by Design - Example 2

Lecture 19 Privacy by Design - Example 3

Lecture 20 Violations - Overview

Lecture 21 Information collection

Lecture 22 Information processing (part 1)

Lecture 23 Information processing (part 2)

Lecture 24 Information dissemination (part 1)

Lecture 25 Information dissemination (part 2)

Lecture 26 Invasions

Lecture 27 Centralization

Lecture 28 Identifiability

Section 4: Privacy by Design Model - Data Oriented Strategies

Lecture 29 Privacy Data-Oriented Strategies - SEPARATE

Lecture 30 Privacy Data-Oriented Strategies - MINIMIZE (part 1)

Lecture 31 Privacy Data-Oriented Strategies - MINIMIZE (part 2)

Lecture 32 Privacy Data-Oriented Strategies - HIDE

Lecture 33 Privacy Data-Oriented Strategies - ABSTRACT

Lecture 34 Privacy Process-Oriented Strategies - ENFORCE

Lecture 35 Privacy Process-Oriented Strategies - DEMONSTRATE

Lecture 36 Privacy Process-Oriented Strategies - INFORM

Lecture 37 Privacy Process-Oriented Strategies - CONTROL

Lecture 38 Architecture Redux

Lecture 39 Information Flow

Lecture 40 Domains and Subdomains

Lecture 41 App example

Lecture 42 Exercises

Section 5: Privacy Analysis - The FAIR method for privacy risk

Lecture 43 Risk Analysis from Privacy perspective

Lecture 44 A FAIR method for privacy risk

Lecture 45 What is Frequency?

Lecture 46 Vulnerability

Lecture 47 Magnitude

Lecture 48 How to apply controls (part 1)

Lecture 49 How to apply controls (part 2)

Lecture 50 Risk at the organization level

Lecture 51 Quantitative Risk Management - example 1 (part 1)

Lecture 52 Quantitative Risk Management - example 1 (part 2)

Lecture 53 App Example

Lecture 54 Exercises

Section 6: Let's create the privacy by design Methodology!

Lecture 55 The purpose of this methodology!

Lecture 56 Quality Attributes

Lecture 57 Identify Information Needs

Lecture 58 Imposing Controls - ARCHITECT & SECURE

Lecture 59 Imposing Controls - Supervise & Balance

Lecture 60 Online Behavioral Advertising & Mobile Phone monitoring

Lecture 61 Integrating privacy by design into the business

Lecture 62 How the methodology meets the initial principles

Lecture 63 The App under the methodology

Lecture 64 Final Exercises

Section 7: BONUS - Remember my first promise to you?

Lecture 65 BONUS - Remember my first promise to you? Learning plan differences

Privacy Enthusiasts,Privacy Law enthusiasts,Lawyers that need the privacy focus,Audit and Compliance people,Data Privacy Officers (DPO),Students of other courses developed by me as a part of the learning plan