Data Protection and Privacy Training
Course Overview
Data privacy has a significant overlap with information security. Importantly, information security is a prerequisite for privacy. Furthermore, many organizational techniques from information security are applicable to maintaining data privacy. However, data privacy also differs from information security in significant ways.
This hands-on course will endeavor to critically look at data protection, privacy regulations and data processing.
Learning Contents
Introduction to data protection and privacy regulations
- Data protection.
- Privacy regulations.
- Common data protection regulations and acts.
- Key data-processing concepts.
- How Microsoft helps support data protection and privacy.
Importance of Data Protection
- Trust
- Reputation
- Legal compliance
- Contractual compliance
- Collecting personal data
- Lawful basis
- Consent
Processing personal Data
- Data quality
- Limited access
- Purpose specification
- Data retention
Individual Rights
- Notice & Transparency
- Access and correction
- Rights to Erasure
- The Role of a Data Protection Officer
- Working with Personal Data
- Processing Personal Data
- The Rights of the Subject
- Encountering Challenges
Data protection vs. data privacy
- Who can collect data.
- Who can access data.
- What an organization can do with the data they have collected.
- How long data may be retained by an organization.
- The level of control an individual has on their data.
Technical Aspects
- Technical aspects of data protection
- Cloud computing
- Profiling technologies
- Privacy by design
- Security protocols
- Data protection impact assessment
The Legal Requirements
- The legal basis of data protection
- The role of Data Processors and Controllers
- Personal data and data subjects
- Special categories of personal data
- Exceptions and derogations
- Data security
- Data protection by design and default
- Accountability and governance
Behavioral Factors
- Potential data security risks for an organization related to employee behavior
- Organizational culture and security
- Improving organizational behavior
- Authentication of system users
- Social media security risks
- Human error
- Compliance, obedience and human motivation
Way forward After the Training
Participants will develop a work plan through the help of facilitators that stipulates application of skills acquired in improving their organizations. ASPM will monitor implementation progress after the training.
Training Evaluation:
Participants will undertake a simple assessment before the training to gauge knowledge and skills and another assessment will be done after the training in-order to demonstrate knowledge gained through the training.
