- Data Discovery – Tool based implementation and practice
- What is Data Discovery
- Importance and Benefits of Data Discovery
- Types of Data Sets
- Ways to conduct Data Discovery
- Data Inventory and usage
- Continual Monitoring of Data Sets.
- Implementation of Tool
Practical Exercise
PE 1 Based on a Case Scenario create data inventory
- Cookie, Consent & Preference Management
- What is a Cookie Policy?
- How to Draft a Cookie Policy?
- Cookie Regulations around the Globe
- First Party Vs Third Party Cookies
- Cookie Banner & requisite requirements
- What is a valid consent?
- Consent Logging
- Exemptions with respect to cookies and consent
- Cookie Audit in real time
Practical Exercise
PE 1 Based on a Case Scenario draft a cookie policy.
PE 2 Based on a Case Scenario identify consent and how it should be obtained.
PE 3 Based on a Case Scenario, identify first party and third party cookies.
- Privacy by Design
- Concepts and the Seven Principles of privacy by design
- Identifying ethical issues in data processing
- Principles of architectural tactics for privacy and privacy patterns and how to implement them
- Ability to map legal Privacy Principles and Technical Privacy Concepts
- How to apply Privacy by Design and its relation to PIA?
Practical Exercise
PE 1 Based on a Case Scenario Draft a Data Retention Policy
PE 2 Based on a Case Scenario Draft a Data Retention Schedule
PE 3 Based on a Case Scenario implement Data Retention Schedule and conduct Deletion
- Data Retention Policy & Retention Schedule
- Understanding the steps to draft an Data Retention Policy
- Implementing the Policy
- Implementing Data Retention
- How to create Data Retention Schedule?
- How to delete data after retention is no longer necessary?
Practical Exercise
PE 1 Based on a Case Scenario Draft a Data Retention Policy
PE 2 Based on a Case Scenario Draft a Data Retention Schedule
PE 3 Based on a Case Scenario implement Data Retention Schedule and conduct Deletion
- Personal Information Management System
- Applicability & Scope of PIMS
- Planning Documentation Management & Selection of Controls.
- Initiation of the PIMS Implementation.
Practical Exercise
PE 1 Based on a Case Scenario Perform PIMS Assessment.
- Data Breach Management
- Data Breach Management Flowchart.
- Obligations of Data Controllers and Data Processors.
- Learn How to handle Data Breach incidents.
- Learn How to handle an Incident response for an organisation.
Practical Exercise
PE 1 How to draft Data Breach Management Manual.
PE 2 How to record incidents in the Data Breach Register.
PE 3 How to notify data subjects in case of a Data Breach.
PE 4 How to notify DPA in case of a data breach.
- Data Subject Rights Management
- Data Subject Rights across the globe
- What is Data Subject Request Management
- What Measures Must We Take After Receiving a DSAR?
- DSAR Exemptions
- Data Subject Response Workflow
- Data Subject Request Manual
- Data Subject Request Form
Practical Exercise
PE 1 Draft a Data Subject Request Manual for an organization.
PE 2 Create a GDPR Complaint Data Subject Request Form.
PE 3 Create and maintain a request register to ensure all requests are managed.
- Vendor Risk Management
- Vendor Audit – Due Diligence
- Transfer of Personal Data to Third Countries
- Adequacy Status
- Data Breach Notifications
- Transfer of Personal Data to Third Countries
- Binding Corporate Rules (BCRs)
- Standard Contractual Clauses (SCCs)
- Data Processing Agreements
- Transfer Impact Assessment
Practical Exercise
PE 1 Based on a case Scenario conduct a Transfer Impact Assessment
- Examination
Examination (50% passing criteria)