IAPP CIPM Certified Information Privacy Manager Study Guide
An essential resource for anyone preparing for the CIPM certification exam and a career in information privacy As cybersecurity and privacy become ever more important to the long-term viability and sustainability of enterprises in all sectors, employers and professionals are increasingly turning to...
Other Authors: | |
---|---|
Format: | eBook |
Language: | Inglés |
Published: |
Hoboken, New Jersey :
John Wiley & Sons, Inc
[2023]
|
Subjects: | |
See on Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009724219206719 |
Table of Contents:
- Cover
- Title Page
- Copyright Page
- Contents at a Glance
- Contents
- Introduction
- The CIPM Exam
- What Does This Book Cover?
- CIPM Exam Objectives
- CIPM Certification Exam Objective Map
- Assessment Test
- Answers to Assessment Test
- Chapter 1 Developing a Privacy Program
- Introduction to Privacy
- What Is Privacy?
- What Is Personal Information?
- What Isn't Personal Information?
- Why Should We Care about Privacy?
- Generally Accepted Privacy Principles
- Management
- Notice
- Choice and Consent
- Collection
- Use, Retention, and Disposal
- Access
- Disclosure to Third Parties
- Security for Privacy
- Quality
- Monitoring and Enforcement
- Developing a Privacy Program
- Crafting Vision, Strategy, Goals, and Objectives
- Structuring the Privacy Team
- Creating a Program Scope and Charter
- Privacy Roles
- Building Inventories
- Conducting a Privacy Assessment
- Implementing Privacy Controls
- Ongoing Operation and Monitoring
- Data Governance
- Data Governance Approaches
- Data Governance Roles
- Access Requirements
- Governing Information Processing
- Managing the Privacy Budget
- Organizational Budgeting
- Expense Types
- Budget Monitoring
- Communicating about Privacy
- Creating Awareness
- Building a Communications Plan
- Privacy Program Operational Life Cycle
- Summary
- Exam Essentials
- Review Questions
- Chapter 2 Privacy Program Framework
- Develop the Privacy Program Framework
- Examples of Privacy Frameworks
- Develop Privacy Policies, Procedures, Standards, and Guidelines
- Define Privacy Program Activities
- Implement the Privacy Program Framework
- Communicate the Framework
- Aligning with Applicable Laws and Regulations
- Develop Appropriate Metrics
- Identify Intended Audience for Metrics
- Define Privacy Metrics for Oversight and Governance per Audience.
- Summary
- Exam Essentials
- Review Questions
- Chapter 3 Privacy Operational Life Cycle: Assess
- Document Your Privacy Program Baseline
- Education and Awareness
- Monitoring and Responding to the Regulatory Environment
- Assess Policy Compliance against Internal and External Requirements
- Data, Systems, and Process Assessment
- Risk Assessment Methods
- Incident Management, Response, and Remediation
- Perform Gap Analysis against an Accepted Standard or Law
- Program Assurance
- Processors and Third-Party Vendor Assessment
- Evaluate Processors and Third-Party Vendors
- Understand Sources of Information
- Risk Assessment
- Contractual Requirements and Ongoing Monitoring
- Physical Assessments
- Mergers, Acquisitions, and Divestitures
- Privacy Assessments and Documentation
- Privacy Threshold Analyses (PTAs)
- Define a Process for Conducting Privacy Assessments
- Summary
- Exam Essentials
- Review Questions
- Chapter 4 Privacy Operational Life Cycle: Protect
- Privacy and Cybersecurity
- Cybersecurity Goals
- Relationship between Privacy and Cybersecurity
- Cybersecurity Controls
- Security Control Categories
- Security Control Types
- Data Protection
- Data Encryption
- Data Loss Prevention
- Data Minimization
- Backups
- Policy Framework
- Cybersecurity Policies
- Cybersecurity Standards
- Cybersecurity Procedures
- Cybersecurity Guidelines
- Exceptions and Compensating Controls
- Developing Policies
- Identity and Access Management
- Least Privilege
- Identification, Authentication, and Authorization
- Authentication Techniques
- Provisioning and Deprovisioning
- Account and Privilege Management
- Privacy by Design
- Privacy and the SDLC
- System Development Phases
- System Development Models
- Integrating Privacy with Business Processes
- Vulnerability Management
- Vulnerability Scanning.
- Vulnerability Remediation
- Data Policies
- Data Sharing
- Data Retention
- Data Destruction
- Summary
- Exam Essentials
- Review Questions
- Chapter 5 Privacy Operational Life Cycle: Sustain
- Monitor
- Monitoring the Environment
- Monitor Compliance with Privacy Policies
- Monitor Regulatory Changes
- Compliance Monitoring
- Audit
- Aligning with Audits
- Audit Focus
- Summary
- Exam Essentials
- Review Questions
- Chapter 6 Privacy Operational Life Cycle: Respond
- Data Subject Rights
- Access
- Managing Data Integrity
- Right of Erasure
- Right to Be Informed
- Control over Use
- Complaints
- Handling Information Requests
- Incident Response Planning
- Stakeholder Identification
- Building an Incident Oversight Team
- Building the Incident Response Plan
- Integrating the Plan with Other Functions
- Incident Detection
- Security and Privacy Incidents
- Security Events and Incidents
- Privacy Incidents
- Reporting Privacy Incidents
- Coordination and Information Sharing
- Internal Communications
- External Communications
- Breach Notification
- Incident Handling
- Risk Assessment
- Containment Activities
- Remediation Measures
- Ongoing Communications
- Post-Incident Activity
- Planning for Business Continuity
- Business Continuity Planning vs. Disaster Recovery Planning
- Project Scope and Planning
- Business Impact Analysis
- Continuity Planning
- Plan Approval and Implementation
- Summary
- Exam Essentials
- Review Questions
- Appendix: Answers to Review Questions
- Chapter 1: Developing a Privacy Program
- Chapter 2: Privacy Program Framework
- Chapter 3: Privacy Operational Life Cycle: Assess
- Chapter 4: Privacy Operational Life Cycle: Protect
- Chapter 5: Privacy Operational Life Cycle: Sustain
- Chapter 6: Privacy Operational Life Cycle: Respond
- Index.
- Comprehensive Online Learning Environment
- EULA.