Privacy Program Management 1
Privacy Program Management 1
Study Guide
Privacy Program Management
Created By: Molinge Teddy, Teaching Assistant
Module 1: Introduction
Lesson 1.1: Introduction
Skills Learned From This Lesson: Develop a Privacy Program, Privacy Program Framework,
Privacy Operational Life Cycle.
● Course Outline
○ Module 1: Introduction.
○ Module 2: Privacy Strategy and Program.
○ Module 3: Privacy Program Operational Elements.
○ Module 4: Summary.
● Introducing the Instructor.
● Learning Objectives
○ Develop a Privacy Program.
○ Understand a Privacy Program Framework.
○ Understand the Privacy Operational Lifecycle.
● Target Audience
○ Chief Privacy Officers.
○ Chief Information or Data Officers.
○ Data Protection Officers.
○ Privacy Managers.
○ Privacy Professionals.
○ Lawyers.
○ Paralegals.
○ Privacy Technicians.
○ Information Technology Professionals.
● WIIFM - What’s In It For Me?
○ Knowledge is Empowering.
○ Confidence.
○ Validation.
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
1
○ Resources.
○ Meet New People.
● Module Summary.
○ Introduced the Instructor.
○ Reviewed course materials.
○ Discussed learning objectives.
○ Overview of target audience.
○ Explored the WIIFM for course attendees.
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
2
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
3
● Learning Objectives
○ Analyze Privacy Manager Job Descriptions -US
○ Analyze Privacy Manager Job Descriptions -UK
○ Analyze Privacy Manager Job Descriptions -AU
● Job Description in Washington DC, US.
○ Privacy Manager (Annual salary: $100,000 - $125,000).
■ Assist in and manage the preparation, maintenance and implementation
of data privacy policies and standard operating procedures.
■ Deliver data insights and trends throughout in order to support privacy by
design.
■ Develop processes for on-boarding and review of vendors in compliance
with privacy requirements, as well as processes for auditing existing
vendors.
■ Implement the use of privacy impact assessment and architect solutions
to drive PIAs and DPIAs at scale in conjunction with IT and supply
management.
■ Develops IT-based solutions for processing data subject access requests.
■ Partners with cybersecurity, IT, regulatory affairs and enterprise risk
management to help manage risk exposure.
■ Maintains professional and technical knowledge by attending
conferences, educational workshops, reviewing professional publications,
and establishing personal networks.
■ Lead the Privacy Council in addressing new challenges, evolving our
policy positions, and help a large cross-functional group make decisions
on how best to maintain our position as one of the location intelligence
industry’s privacy thought leaders.
■ Assess the global privacy framework in collaborations with the Product
and Engineering Teams, including internal and external privacy policies.
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
4
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
5
■ Developing and providing privacy training to the Trustee’s staff and other
stakeholders to enhance privacy awareness and decision making in
relation to privacy.
● Lesson Summary
○ Reviewed three different job descriptions around the globe.
○ Discussed similarities and differences in those job descriptions.
● Learning Objectives
○ Developing a Strategy.
○ Developing a Vision.
○ Gaining Approval.
● Developing a privacy strategy
○ Business Alignment.
○ Finalize Operational business case for privacy.
○ Identify stakeholders.
○ Leverage key functions.
○ Create a process for interacting with the community.
○ Align and adjust culture.
○ Obtain funding.
○ Development statements on collection, authorized use, access, and destruction
of information.
○ Privacy inquiry/complaint handling.
○ Program flexibility due to external factors.
● Create a Vision
○ Privacy vision should align with the organization's objectives.
○ Provide feedback to key stakeholders.
○ Short and succinct - a few sentences a most - 30 seconds to read.
● Vision Example
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
6
○ The Stanford University Privacy Office works to protect the privacy of university,
employee, patient, and other confidential information. Our office helps to ensure
proper use and disclosure of such information, as well as, foster a culture that
values privacy through awareness. The Privacy office provides meaningful advice
and guidance on privacy “Best Practices” and expectations for the University
community.
● Executive Approval
○ Vision can and should be approved before an actual program is developed.
○ Vision can be amended before the program is running.
○ C-Level and Board of Directors should provide written approval of the vision.
● Evaluate the Objective
○ Is the vision attainable?
○ What major obstacles exist?
○ Is funding required?
○ Does the vision reach all stakeholders?
● Lesson Summary
○ Discuss developing a privacy strategy and vision.
○ Discussed the importance of organizational structure and approval.
● Learning Objectives
○ Understanding Centralization of Data Governance.
○ Understanding Decentralization of Data Governance.
○ Understanding Potential Hybrid Solutions.
● Centralized - Local (Decentralized) - Hybrid
○ Regardless of the model chosen it should ensure information is controlled and
distributed to decision-makers.
○ Centralized - One person in charge allowing for direction to flow from a single
source.
○ Local (Decentralized) - Decisions are made locally where fewer tiers of
leadership exists allowing for a wider span of control.
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
7
Source:
https://www.mckinsey.com/business-functions/organization/our-insights/to-centralize-or-not-to-c
entralize#
● Lesson Summary
○ Discussed data governance models such as centralized, decentralized, and
hybrid.
○ Discussed the benefits and downsides of each model.
● Learning Objectives
○ Understand Privacy Program Scope and Charters.
○ Discover Scope Integration Concerns.
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
8
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
9
● Learning Objectives
○ Understand how PII is used in an Organization.
○ Understand Applicable Laws.
● Identify PII Used
○ Consumer and Employee PII.
○ Preliminary Workflows.
○ Survey or Interview stakeholders.
○ Data Maps - May consist of logical diagrams of systems, applications, and
repositories.
● Applicable Laws
○ General privacy laws (e.g. GDPR, Australian, Argentina, etc.)
○ Federal privacy laws by sector - Health, Financial, Consumer.
○ State, provincial, local, or territory laws.
○ Online privacy laws.
○ Workplace privacy.
○ Understand penalties for noncompliance.
○ Inside or outside counsel should be consulted.
● Lesson Summary
○ Discussed how to determine how PII is used throughout the organization.
○ Discussed various types of laws and regulations that may be included in a
privacy program.
● Learning Objectives
○ Understand funding benefits.
○ Understand program size based on organizational size.
○ Learn how to build program awareness
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
10
● Lesson Summary
○ Discussed how to found a program.
○ Discussed various considerations of program reach due to organizational size.
○ Discussed how to improve the awareness of the privacy program.
Lesson 2.8: Introduction to ISO/IEC 27701:2019 and Privacy Information Systems (PIMS)
Skills Learned From This Lesson: What ISO/IEC 27701 Covers, Understanding of the ISO/IEC
27701 Outline, Privacy Information Systems (PIMS).
● Learning Objectives
○ What ISO/IEC 27701 Covers.
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
1 1
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
12
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
13
Lesson 2.9: Introduction to the National Institute of Standards and Technology (NIST) Privacy
Framework v1.0
Skills Learned From This Lesson: What NIST Privacy Framework v1.0 Covers, Understanding
of the Specifics of the NIST Privacy Framework v1.0, Frameworks basics.
● Learning Objectives
○ What NIST Privacy Framework v1.0 Covers.
○ Understanding of the Specifics of the NIST Privacy Framework v1.0
● What does NIST Privacy Framework Cover?
○ Building consumer trust by supporting decision-making in product and service
design or deployment and optimizes beneficial uses of data while minimizing
adverse consequences for individuals privacy and society as a whole.
○ Fulfilling current compliance obligations, as well as future-proofing products and
services to meet these obligations in changing technological and privacy
environments.
○ Facilitating communication about privacy practices with individuals, business
partners, assessors, and regulators.
● What does NIST Privacy Framework Include?
○ An introduction to their framework.
○ Frameworks basics.
○ How to use the framework.
● Specifics of the Privacy framework
○ Core - an increasingly granular set of activities and outcomes that enable an
organizational dialogue about managing privacy risk.
○ Profiles - selection of Functions, Categories, and Subcategories from the Core
that an organization has prioritized to help manage privacy risk.
○ Implementation Tiers - communication about whether an organization has
sufficient processes and resources in place to manage privacy risk and achieve
its target profile.
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
14
● Lesson Summary
○ Discussed the ISO/IEC 27701 Standard.
○ Reviewed the ISO/IEC 27701 Outline.
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
15
● Learning Objectives
○ Explore how policies are created.
○ Learn about policies and procedures to support the privacy policy.
○ Explore standards and guidelines to influence the policy.
● Develop Policies - Standards - Guidelines
○ Policies - Different from mission and vision, aligned with goals, and strategic.
○ Standards - Badges, uniforms, physical security, etc.
○ Guidelines - Use of antivirus software, firewalls, email security, encryption,
VPN’s, etc.
● Policy Structure
○ Purpose - Why the policy exists.
○ Scope - Defines resources covered.
○ Risk and responsibilities - Responsibilities of roles (internal and external),
training, and stakeholder accountability.
○ Compliance - Reference to applicable privacy laws or regulation(s), oversight,
audicting, response, penalties.
○ Note: Different from operational procedures...a policy is a high-level document.
● Policy Cost Considerations
○ Administrative time to draft, develop, and approve.
○ Practical protections aligned to privacy vision or mission.
○ Allow the organization to reasonably conduct business.
● Microsoft Privacy Statement
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
16
URL: https://privacy.microsoft.com/en-US/privacystatement
○ Information Disposition.
● Other Policies to consider in practice
○ Merger and acquisition.
○ Software development.
○ Product development.
○ Artificial intelligence.
● Privacy Program Activities (Procedures)
○ Education and awareness.
○ Monitoring and responding to the regulatory environment.
○ Internal policy compliance.
○ Data inventories, data flows, and classification.
○ Risk assessment (Privacy Impact Assessments(PIA’s, DPIA’s, etc.)).
○ Incident Response.
○ Remediation.
○ Program Assurance and Audits.
● Popular Privacy Principles and Standards
○ Fair Information Practices developed in the early 1970s.
○ OECD Guidelines on the Protection of Privacy and Transborder Flows.
○ Generally Accepted Privacy Principles (GAPP).
○ Asia-Pacific Economic Cooperation (APEC) Privacy Framework.
○ Binding corporate rules (BCRs) - Article 47 of the GDPR references BCRs have
to be approved by the competent supervisory authority.
○ European Telecommunications Standards Institute (ETSI).
○ ISO/IEC 27701:2019 - Extension to ISO/IEC 27001 and ISO/IEC 27002 for
privacy information management.
● Lesson Summary
○ Discussed how to create policies and procedures related to privacy management.
○ Reviewed supporting policies and procedures with examples.
● Learning Objectives
○ Explore how to plan what metrics to consider.
○ Understand metrics to measure compliance.
○ Understand metrics to measure non-compliance.
● Planning
○ Determine the audience for the metrics.
○ Determine what you are measuring (i.e. Risk and Revenue Activities).
○ Define reporting resources.
○ Understand how information is collected, where stored, and who or what has
access (i.e. mobile app data, websites, landing pages, Internet of Things (IoT)
devices, etc.)
● Compliance
○ Collection.
○ Responses to data subject inquiries.
○ Use and Retention.
○ Disclosures to third parties.
○ Training and Awareness tracking.
○ Incident (breaches, complaints, inquiries)
○ PIA and DPIA metrics.
● Non-Compliance
○ Trending analysis.
○ Privacy program return on investment (ROI).
○ Program maturity.
○ Resource utilization.
○ Revenue from data sold or accessed.
● Lesson Summary
○ Discussed what metrics to consider for your privacy program.
○ Reviewed how to use metrics for compliance and non-compliance.
Skills Learned From This Lesson: Audits, building a better pen tester, privacy program.
● Learning Objectives
○ Discuss how auditing can aid a privacy program.
○ Explore examples on what to audit to support the privacy program.
● Audit Overview
○ Conducted by internal team, individual, or third-party.
○ Occur at a predefined time period, in response to an incident, or at the request of
an enforcement authority.
○ Contains a plan, can be subjective (i.e. employee interviews and review of
system logs).
○ Goal: Validate what is working, what is not working, or a collection of information
at a specific period.
● Audits Related to Privacy Program
○ System Penetration Testing.
○ Controlled Social Engineering.
○ Audit program to framework or maturity model.
○ Data centers and office access.
○ Data Subject Access Requests (DSAR’s).
○ Document destruction.
○ Media sanitization and disposal of technology assets (e.g. hard drives,
USB/thumb drives, servers, etc.)
○ Device security (e.g. mobile devices, Internet of Things (IoT), geo-tracking,
imaging/copier hard drive security controls.
○ Tip: Personal cloud storage, personal email usage, home equipment.
● Penetration Testing Blueprint
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
20
● Lesson Summary
○ Discussed how an audit can improve a privacy program.
○ Reviewed various audit examples.
● Learning Objectives
○ Learn how to assess and analyze the privacy program through various
assessments including regulatory, PIA’s and DPIA’s.
○ Explore third-party assessments, physical assessments, and assessments
involve corporate changes such as mergers, acquisitions, and divestitures.
● Source: Transition Support URL: https://transition-support.com/faq38.html
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
21
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
22
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
23
● Learning Objectives
○ Explore security items in frameworks and common security terms.
○ Understand how Security and Privacy work together.
● Security Topics Covered in ISO 27701 (i.e. PIMS - specific guidance related to ISO IEC
27002)
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
25
● Learning Objectives
○ Discuss transitioning into a privacy role and how data protection plays a role in
privacy management.
○ Discuss the importance of data retention management and the value of data.
● Lesson Summary
○ Discussed the importance of monitoring privacy regulations to ensure data is
adequately protected.
○ Reviewed the importance of data retention privacy management and the value of
data to reduce risk.
● Learning Objectives
○ Analyze Cloud Vendor Privacy Examples
○ Review an App Privacy Policy
● Amazon Shared Responsibility Model
Source URL: https://aws.amazon.com/compliance/shared-responsibility-model/
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
27
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
28
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
29
● Lesson Summary
○ Discussed privacy examples from several cloud vendors.
○ Reviewed a privacy example from a mobile app vendor.
● Learning Objectives
○ Explore the definition of a record.
○ Discuss types of records common to a privacy program.
○ Analyze record retention schedule examples
● What is a Record?
○ According to ARMA international, a record is any recorded information,
regardless of medium or characteristics, made or received by an organization
that is evidence of its operations, and has value requiring its retention for a
specific period of time.
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
30
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
31
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
33
● Lesson Summary
○ Discussed various records that are part of a privacy program.
○ Reviewed examples of retention schedules.
● Learning Objectives
○ Discuss Common Methods and Concerns.
○ Review Privacy Training Resources
● Common Methods
○ Classroom training.
○ Online learning through streaming, videos and websites.
○ Poster campaigns.
○ Booklets.
○ Workshops.
○ Gamification.
○ Mobile Apps.
○ Certification training for key stakeholders.
● Points of Caution
○ Equating education with awareness.
○ Using only one communication channel.
○ Lack of effectiveness measurements.
○ Eliminating either education or awareness due to budget concerns.
● Data Security and Privacy
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
34
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
35
● Learning Objectives
○ Discuss the basic and objective of Privacy by Design (PbD).
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
36
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
37
■
Requires architects and operators to offer such measures as strong
privacy defaults, appropriate notice, and empowering user-friendly
options.
● GDPR Consistent with PbD
○ Article 25 - Data protection by design and by default
○ Emphasizes privacy protection by default
○ Recital 78 - Appropriate technical and organizational measures
● PbD in Action
○ Software Development
○ Internet of Things (IoT)
○ Social Media Sites
○ Websites
○ Electronic Forms
○ Client Relationship Management (CRM) systems
○ Separation of consumers from one region from another (i.e. EU consumers may
not have data captured as non-EU consumers)
● Lesson Summary
○ Discussed the origins and objective of PbD
○ Analyzed the 7 Principles of PbD
○ Reviewed PbD in practice examples
● Learning Objectives
○ Explore what a Data Subject is as referenced by regulations
○ Understand the difference between opt-in versus opt-out
● Data Subjects
○ Data Subjects = Individuals whose personal information is being accessed,
processed, stored, or transferred by an organization.
● Responsibilities to Data Subjects from Organizations typically include:
○ Notice of how information is collected and used.
○ High visibility and accessibility to notices.
○ Where to submit requests.
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
38
● Learning Objectives
○ Explore various US Laws and how they impact data subjects.
○ Explored various state laws and how they impact data subjects.
● US Federal Laws and Functions that Impact Data Subjects
○ Federal Credit Reporting Act (FCRA).
○ Health insurance Portability and Accountability Act (HIPAA).
○ Controlling the Assault of Non-Solicited Pornography and Marketing
(CAN-SPAM).
○ Privacy Act of 1974.
○ Freedom of information Act (FOIA).
○ CARES Act of 2020.
● US State Laws that Impact Data Subjects
○ California Consumer Privacy Act (CCPA)
○ California “Shine the Light” Law
○ California “Online Eraser” Law
○ California Online Privacy Protection Act
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
39
● Learning Objectives
○ Explore the GDPR and how it impacts data subjects
○ Handling concerns with EU dat subjects
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
40
● Learning Objectives
○ Analyze incident planning and implementation
○ Explore incident response and notifications
● Incident Planning and Implementation
○ Determine incident framework (i.e. secure, notify, resolve)
○ Merge into existing incident procedures (i.e. medical, human resources, and
information technology)
○ Incident detection in technology, processes, and people
○ Incident classification and escalation workflows
○ Determine a reporting and escalation process
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
42
● Learning Objectives
○ Analyze key roles in incident management
○ Explore functions of key roles during an incident
● Key Roles Required for an Incident
○ Privacy Team members may not be included in incident response team
○ Incident Team Members: Appointed Overseer, Tech Lead, Communications
(internal/external), Social Media, Customer Support, Corporate Counsel,
Accounting, Risk Advisory, and Insurance Agency
● Incident Levels
○ Consider adopting levels of criticality for incidents to guide roles during an
incident
○ Red, Yellow, Green (Red being severe and Green being normal)
○ Level 1-5 (1 being minor and 5 being severe)
● Incident Role Overlap
○ Consider other groups to determine if certain incident functions can be
streamlined
○ Helpdesk, Business Continuity, Vendors, Disaster Recovery, Internal Audit,
Cyber Security, and Facilities
● Lesson Summary
○ Discussed key roles in incident management
○ Reviewed functions of key roles when responding to incidents
● Learning Objectives
○ Explore the types of incidents that may occur
○ Analyze the different types of incidents with examples
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
44
● Types of Incidents
○ Card - When cards used to transfer funds are compromised
○ Hack - When a criminal or system intentionally compromises a system and steals
data
○ Insider - Employee or trusted individual takes information
○ Loss - Lost USB drives, mobile devices, pappers, or workstations
○ Accidental Disclosure - Unintentionally sharing sensitive information
● Card Incidents
○ Skimming Devices, RFID Scanners, Point-of-Service terminals
○ Information taken from magnetic strip, a photo of the card is taken, or malware
transfers data from the transaction elsewhere
● Hack Incidents
○ Software such as Malware or Ransomware used to take information, encrypt
information, or control information for nefarious purposes
○ Organized Crime, Rogue Nations, Lone Wolf, Hacker-for-Hire
● Insider Incidents
○ Deliberate unauthorized access, theft, or sabotage made by employees or
subcontractors
● Loss Incidents
○ Lost USB drive, laptop, mobile phones, workstations, data center equipment,
paper record boxes, backup tapes, data files that cannot be restored
● Accidental Disclosure Incidents
○ Including an unintended recipient on an email, exposing confidential information
on a screen or paper in public, sharing information verbally in public, sharing a
link to an unintended recipient, acts of God, terrorism, vendor error, natural
occurances, celestial incidents
● Lesson Summary
○ Discussed the different types of incidents
○ Reviewed each of the specific incident types with examples
Module 4: Summary
Lesson 4.1: Future of Privacy
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
45
● Course Outline
○ Module 1: Introduction.
○ Module 2: Privacy Strategy and Program.
○ Module 3: Privacy Program Operational Elements.
○ Module 4: Summary.
● Learning Objectives
○ Explore the possible future of privacy
○ Review how the possible future could impact our privacy program
● Look into the past…
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
46
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
47
● Learning Objectives
○ Explore topics covered from the course
● Module 2 | Privacy Strategy and Program
○ Module 2.1: Role of the Privacy Manager
○ Module 2.2: Review Privacy Manager Job Descriptions
○ Module 2.3: Developing a Strategy and Vision
○ Module 2.4: Establish a Program Data Governance Model
○ Module 2.5: Define a Program Scope and Charter
○ Module 2.6: Identify how PII is used and Applicable Laws
○ Module 2.7: Additional Program Considerations
○ Module 2.8: Introduction to ISO/IEC 27701:2019
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
48
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
49