We will contact you shortly.
The Certified Information Privacy Technologist (CIPT) credential shows the knowledge to build one’s organization’s privacy structures from the ground up. The risk for organizations that do not comply with data privacy regulations is costly, as is the loss of customer trust. Companies that employ professionals with CIPT certifications are better able to apply strategies, policies, processes, and techniques to manage cybersecurity risks while enabling prudent data to use for business purposes.
This certification applies to anyone in IT, security, or engineering. Privacy in Technology training teaches technology and data professionals how to understand and integrate strategies and techniques to minimize privacy threats. The curriculum includes privacy-by-design principles; implementing data and process-oriented strategies to support privacy policies; and managing threats from AI, location tracking, etc.
Whether one works in the public or private sector, data privacy skills are quickly becoming a must-have—and that’s a great opportunity for you.
● 1 - Year IAPP Membership● 1 - IAPP Exam Voucher● Virtual Live Training● IAPP e-book & notes● Sample Mock Exam● Certificate of Attendance
DURATION3 days of virtual live training (via Zoom). The class will commence at 7 am India time.
CONFIRMATION & RESERVATIONWhen registration is confirmed, participants will receive our email confirmation along with information of the course programme. If no seats are available for the applied date, you will be notified immediately and given an alternative date. Tsaaro Academy reserves the right to change the course schedules, programmes and content without prior notice. We also reserve the right to cancel course due to unforeseen circumstances.
CANCELLATIONRequest for withdrawal or postponement must be made in writing to Tsaaro Academy. Refunds arising from course withdrawal/deferment will be subjected to the following terms:
More than 2 weeks before course commencement: Full refund.Less than 2 weeks before course commencement: 50% refund.On or after course commencement: No refund.
DELIVERY FORMAT● Lecture style● Teacher-led Classroom Training● Discussions with consultants● Roleplay / presentations
TRAINERS & CONSULTANTSTsaaro Academy is an Official Training Partner of the International Association of Privacy Professionals (IAPP). Our trainers have been actively engaged in doing actual PDPA audits of Indian companies for Tsaaro Academy, and are certified by IAPP to conduct the CIPT course. Together, the team has also trained thousands of participants in the Personal Data Protection Act.
LEARNING OUTCOMES● Recognize foundational elements for embedding privacy in technology● Describe the fundamentals of privacy as they relate to the privacy technologist ● Identify the risks to privacy that are inherent throughout the data life cycle and explain how software security helps to mitigate privacy threats● Outline how technical measures and privacy-enhancing technologies may be used to enhance privacy throughout all steps of the data life-cycle● Explain the role of privacy engineering within an organization● Describe the process and methodology of the privacy-by-design model● Examine the unique challenges that come from online privacy issues
BODY OF KNOWLEDGEThe CIPT body of knowledge outlines all the concepts and topics that you need to know to become certified.
I. Foundational PrinciplesA. Privacy Risk Models and Frameworks
B. Privacy by Design Foundational Principles
C. Value Sensitive Design
D. The Data Life Cycle
II. The Role of IT in PrivacyA. Fundamentals of privacy-related IT
B. Information Security
C. The privacy responsibilities of the IT professional
III. Privacy Threats and ViolationsA. During Data Collection
B. During Use
C. During Dissemination
D. Intrusion, Decisional Interference and Self Representation
E. Software Security
IV. Technical Measures and Privacy Enhancing TechnologiesA. Data-Oriented Strategies
C. Process Oriented Strategies
V. Privacy EngineeringA. The Privacy Engineering role in the organization
B. Privacy Engineering Objectives
C. Privacy Design Patterns
D. Privacy Risks in Software
VI. Privacy by Design MethodologyA. The Privacy by Design Process
B. Ongoing Vigilance
VII. Technology Challenges for PrivacyA. Automated decision making
B. Tracking and Surveillance
D. Ubiquitous computing
E. Mobile Social Computing
CERTIFICATE OF PROFICIENCYAll course participants are required to take the CIPT examination after completing the 3 days of virtual live training. Candidates must pass this exam in order to get the CIPT certification and use the CIPT credentials with his or her name.