Data Protection and Privacy Training

Course Overview

Data privacy has a significant overlap with information security. Importantly, information security is a prerequisite for privacy. Furthermore, many organizational techniques from information security are applicable to maintaining data privacy. However, data privacy also differs from information security in significant ways.

This hands-on course will endeavor to critically look at data protection, privacy regulations and data processing.

Learning Contents

Introduction to data protection and privacy regulations

  • Data protection.
  • Privacy regulations.
  • Common data protection regulations and acts.
  • Key data-processing concepts.
  • How Microsoft helps support data protection and privacy.

Importance of Data Protection

  • Trust
  • Reputation
  • Legal compliance
  • Contractual compliance
  • Collecting personal data
  • Lawful basis
  • Consent

Processing personal Data

  • Data quality
  • Limited access
  • Purpose specification
  • Data retention

Individual Rights

  • Notice & Transparency
  • Access and correction
  • Rights to Erasure
  • The Role of a Data Protection Officer
  • Working with Personal Data
  • Processing Personal Data
  • The Rights of the Subject
  • Encountering Challenges

Data protection vs. data privacy

  • Who can collect data.
  • Who can access data.
  • What an organization can do with the data they have collected.
  • How long data may be retained by an organization.
  • The level of control an individual has on their data.

Technical Aspects

  • Technical aspects of data protection
  • Cloud computing
  • Profiling technologies
  • Privacy by design
  • Security protocols
  • Data protection impact assessment

The Legal Requirements

  • The legal basis of data protection
  • The role of Data Processors and Controllers
  • Personal data and data subjects
  • Special categories of personal data
  • Exceptions and derogations
  • Data security
  • Data protection by design and default
  • Accountability and governance

Behavioral Factors

  • Potential data security risks for an organization related to employee behavior
  • Organizational culture and security
  • Improving organizational behavior
  • Authentication of system users
  • Social media security risks
  • Human error
  • Compliance, obedience and human motivation

Way forward After the Training

Participants will develop a work plan through the help of facilitators that stipulates application of skills acquired in improving their organizations. ASPM will monitor implementation progress after the training.

Training Evaluation:

Participants will undertake a simple assessment before the training to gauge knowledge and skills and another assessment will be done after the training in-order to demonstrate knowledge gained through the training.

error: