GDPR Privacy Data Protection CASE STUDIES (CIPT,CIPM, CIPP)
4.7 (79 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
2,621 students enrolled

GDPR Privacy Data Protection CASE STUDIES (CIPT,CIPM, CIPP)

Examples of how a privacy professional should approach GDPR data protection compliance (CIPT, CIPM, CIPP/E)
Bestseller
4.7 (79 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
2,621 students enrolled
Created by Roland Costea
Last updated 8/2020
English
English [Auto]
Current price: $139.99 Original price: $199.99 Discount: 30% off
11 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 6 hours on-demand video
  • 12 articles
  • 49 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • One of my customer's reports
  • Apply GDPR concepts in real life environments
  • Understand how to approach GDPR from different companies perspectives
  • Sample IAPP exam questions
  • Subject Access Request explained step by step
  • How i personally use the templates offered in my first course to perform an assessment
  • Understand exactly how to think as a privacy professional
Requirements
  • Basic GDPR knowledge
  • Basic Data Privacy knowledge
  • My previous GDPR Data Protection from scratch (CIPT) course
  • English language
Description

“Lessons from ex IBM-er, MICROSOFT-er about how to make privacy operational and how to get 3 privacy certifications in less than 30 days: CIPTv2020, CIPM, CIPP/E by IAPP”

***************************************************************************************************************************************************

**** 2020 Updated****  6+ hours of content! Learn GDPR by examples!

***************************************************************************************************************************************************

No prior GDPR knowledge is needed.

CIPT, CIPM and CIPP/E certification preparation in a complete learning plan

This is the 3rd course in a 6 course series that will drive you to Data Privacy expert and will allow you to go for all IAPP certifications: CIPT, CIPM and CIPP/E.

MY FIRST PROMISE TO YOU is the following: You will be prepared to pass 3 IAPP certifications in less than 30 days if you follow the below learning plan:

Course 1: Build EU GDPR data protection compliance from scratch (CIPT)

Course 2: How to succeed in a Data Privacy Officer Role (GDPR DPO, CIPM)

Course 3: GDPR Privacy Data Protection Case Studies Explained (CIPP/E, CIPM, CIPT) - we are here!!!

Course 4: Ultimate Privacy by Design Guide - step by step strategies with examples (CIPM, CIPT)

Course 5: Build Security Incident Response for GDPR Data Protection (incl. parts from CIPT and CIPM also)

Course 6: (part of CIPP/US): California Consumer Privacy Act (CCPA) - Complete course

***************************************************************************************************************************************************

My name is Roland Costea and after spending my last 8 years working for Microsoft, IBM, Genpact and Cognizant as a Privacy & Security Director being able to create hundreds of integrated security & privacy programmes for top organizations in the world, I have decided to put all my experience together in a comprehensive privacy LEARNING PLAN, to show how to actually make Data Privacy operational and most importantly how to think out of the box.

I have been involved in engineering privacy for a lot of industries including Automotive (Mercedes-Benz, Geely, Volvo) and also provided DPO as a service for several other top companies in Europe and US. I have worked and developed the privacy strategy for Microsoft & IBM for the whole Central & Eastern Europe and also drived Cognizant Security & Privacy business in DACH.

Certifications I hold: CIPT, CIPM, CISSP, CDPSE, CRISC, CISM, CCSK, CCSP, LPT, CEH, ECSA, TOGAF

***************************************************************************************************************************************************

This course will save you thousands of dollars in consultancy by teaching you how to THINK! this is your most important asset and you will stand out from the crowd who just knows theory.

***************************************************************************************************************************************************

Course Curricula:

Section 1: Introduction

Section 2: Step by Step Customer Personal Data Analysis

Section 3: From Small & Medium Enterprise (SME) to Multinational examples

Section 4: International Transfers and DPO

Section 5: Subject Access Requests (SARs/DSARs) - how to deal with

Section 6: IAPP exam questions analysed: CIPP/E, CIPM, CIPT

Section 7: Bonus


Who this course is for:
  • Everyone interested in the application of GDPR with real examples
  • All privacy and cybersecurity enthusiasts
  • GDPR practitioners
  • DPOs, Privacy Managers, Privacy Consultants
Course content
Expand all 67 lectures 06:07:56
+ Introduction
6 lectures 16:47

Who am i and why you should start learning with me

Preview 03:16

Understand what you will learn in this course

Preview 10:15

Course documents

Course Documents
00:04

Read the Scenario carefully!

Scenario for the 5 Challenges
00:01

This is the first challenge of this course

Challenge 1
00:09
+ Step by Step Customer Personal Data Analysis
8 lectures 13:56

Understand the customer scenario for this example

Preview 03:39

How to fill in the personal data analysis form

Preview 03:51

Understand how to use the personal data flow mapping and diagram

Personal Data Flow Mapping and Diagrams
01:57

Understand how to use the Personal Data Asset Inventory

Personal Data Asset inventory
00:02

Understand how to use the 3rd party processing providers

3rd party processing providers
02:18

How to create the GDPR assessment report

GDPR assessment report
00:04

How to create the GDPR implementation project plan

Preview 01:56

Read the Challenge carefully and draft your response! Take care of the analysis points. In the last section you will find the answer of the whole list of challenges

Challenge 2
00:09
+ From Small & Medium Enterprise (SME) to Multinational examples
20 lectures 02:26:32

Example 1 - EU SME - part 2

EU SME - Assessing GDPR Compliance step by step
07:37

Example 1 - EU SME - part 3

EU SME - Compliance, Technical Assessment and Privacy by Design
07:48

Example 1 - EU SME - part 4

EU SME - Data Transfers
05:40

Example 2 - US multinational - part 2

US Multinational - Assessing GDPR Compliance step by step
09:47

Example 2 - US multinational - part 3

US Multinational - Compliance with other Obligations
03:18

Example 2 - US multinational - part 4

US Multinational - Technical Assessments and Data Breach
11:00

Example 2 - US multinational - part 5

US Multinational - Data Transfers
05:42

GDPR Privacy case study - Google Chrome

Chrome Browser - GDPR case study
07:36

GDPR for Hotels online business

Top concerns for Hotels Online Businesses
10:44

GDPR - a privacy practical guide for SMEs

A practical Guide for Small Enterprises (SMEs)
04:41

How to make a website GDPR compliant

How to make a website GDPR compliant
04:28

Outsourcing Data Privacy Officer (DPO)

Outsourcing your DPO: Real-Life Scenarios
10:00

Legal response to data breaches

Legal Response to Data Breaches in the Cloud
09:37

Consent to Children's data - is it legal or not?

Consent to Children's Data - is it Legal?
09:16

Understand what to erase and how from backup systems and archives after a request to erase if received

GDPR Right to Erasure and Backup Systems
08:05

Understand Video Surveillance Guidelines (part 1)

Video Surveillance Guidelines (part 1)
08:37

understand Video Surveillance Guidelines (part 2)

Video Surveillance Guidelines (part 2)
07:48

Download the word document from the Resources area. Read the Challenge carefully and draft your response! Take care of the analysis points. In the last section you will find the answer of the whole list of challenges

Challenge 3
00:09
+ International Transfers and DPO
9 lectures 01:11:23

When a DPO is mandatory or voluntary

Preview 04:25

GDPR international transfers with examples

International Transfers with examples
09:02

How to make a restricted transfer - adequacy decision

How do we make a restricted transfer in accordance with GDPR – adequacy decision
06:03

How to make a restricted transfer - safeguards

Safeguards
11:42

How to make a restricted transfer - exceptions

Exceptions
15:05

Controllers and GDPR Data Privacy Officers not in the EU

Controllers & GDPR DPOs not in the EU (LSAs examples)
07:01

The difference between representatives and data privacy officers (DPO)

Representatives vs DPOs
10:31

Understand the differences between Data Sovereignty , Data Residency and Data Localization

Data Sovereignty vs Data Residency vs Data Localization
07:25

Download the word document from the Resources area. Read the Challenge carefully and draft your response! Take care of the analysis points. In the last section you will find the answer of the whole list of challenges

Challenge 4
00:09
+ Subject Access Requests (SARs/DSARs) - how to deal with
11 lectures 48:28

You will understand what SARs are

Overview of SARs
04:04

Understand how to recognize a valid SAR

How to recognize a valid SAR
08:53

Understand how to respond to a SAR

Responding to a SAR
06:37

Understand how to deal with SARs involving other people information- part 1

Dealing with SARs involving other people information- part 1
04:43

Understand how to deal with SARs involving other people information- part 2

Dealing with SARs involving other people information- part 2
04:47

Understand what information to supply to the requester

Supplying information to the requester
05:44

Understand how to deal with repeated or unreasonable requests

Dealing with repeated or unreasonable requests
03:23

Understand how to deal with exemptions - part 1

Exemptions - part 1
04:08

Understand how to deal with exemptions - part 2

Exemptions - part 2
03:28

Understand how to deal with exemptions - part 3

Exemptions - part 3
02:32

Download the word document from the Resources area. Read the Challenge carefully and draft your response! Take care of the analysis points. In the last section you will find the answer of the whole list of challenges

Challenge 5
00:09
+ IAPP exam questions analysed: CIPP/E, CIPM, CIPT
11 lectures 01:07:45

Understand what else do you need besides my full learning plan in order to pass CIPP/E

Read Chapter 1 & 2 from this book to pass the CIPP/E certification
00:07

Understand CIPP/E questions and how to think these scenarios

Preview 13:16

Understand CIPP/E questions and how to think these scenarios

CIPP/E scenarios - part 2
06:15

Understand CIPP/E questions and how to think these scenarios

CIPP/E scenarios - part 3
10:28

Understand CIPM questions and how to think these scenarios

CIPM scenarios - part 1
06:02

Understand CIPM questions and how to think these scenarios

CIPM scenarios - part 2
07:37

Understand CIPM questions and how to think these scenarios

CIPM scenarios - part 3
08:26

Read this review before going for CIPM exam

Read this short review before going for CIPM exam
00:04

Understand CIPT questions and how to think these scenarios

CIPT scenarios - part 1
04:45

Understand CIPT questions and how to think these scenarios

CIPT scenarios - part 2
05:29

Understand CIPT questions and how to think these scenarios

CIPT scenarios - part 3
05:16
+ BONUS - Remember my first promise to you?
2 lectures 03:03

Answers to the 5 challenges

Answers to Challenges
00:01

How to continue your learning plan to CIPT, CIPM and CIPP/E

Remember my first promise to you - get certified in less than 30 days?
03:02