Autoplay
Autocomplete
Previous Lesson
Complete and Continue
GDPR Privacy Data Protection CASE STUDIES (CIPT,CIPM, CIPP)
Section 1: Introduction
1. Why start learning with me (3:16)
2. What you will learn from this course! (10:15)
3. Course Documents
Challenge 1
Section 2: Step by Step Customer Personal Data Analysis
4. Customer Scenario Description (3:39)
5. Personal Data Analysis Form (3:51)
6. Personal Data Flow Mapping and Diagrams (1:57)
7. Personal Data Asset inventory
8. 3rd party processing providers (2:18)
9. GDPR assessment report
10. GDPR implementation project plan (1:56)
Challenge 2
Section 3: From Small & Medium Enterprise (SME) to Multinational examples
11. EU SME - Business details, DPO, insourcing vs outsourcing (8:00)
12. EU SME - Assessing GDPR Compliance step by step (7:37)
13. EU SME - Compliance, Technical Assessment and Privacy by Design (7:48)
14. EU SME - Data Transfers (5:40)
15. US Multinational - Business details, DPO, insourcing vs outsourcing (6:39)
16. US Multinational - Assessing GDPR Compliance step by step (9:47)
17. US Multinational - Compliance with other Obligations (3:18)
18. US Multinational - Technical Assessments and Data Breach (11:00)
19. US Multinational - Data Transfers (5:42)
20. Chrome Browser - GDPR case study (7:36)
21. Top concerns for Hotels Online Businesses (10:44)
22. A practical Guide for Small Enterprises (SMEs) (4:41)
23. How to make a website GDPR compliant (4:28)
24. Outsourcing your DPO: Real-Life Scenarios (10:00)
25. Legal Response to Data Breaches in the Cloud (9:37)
26. Consent to Children's Data - is it Legal? (9:16)
27. GDPR Right to Erasure and Backup Systems (8:05)
28. Video Surveillance Guidelines (part 1) (8:37)
29. Video Surveillance Guidelines (part 2) (7:48)
Challenge 3
Section 4: International Transfers and DPO
30. Mandatory and Voluntary DPO (4:25)
31. International Transfers with examples (9:02)
32. How do we make a restricted transfer in accordance with GDPR – adequacy decision (6:03)
33. Safeguards (11:42)
34. Exceptions (15:05)
35. Controllers & GDPR DPOs not in the EU (LSAs examples) (7:01)
36. Representatives vs DPOs (10:31)
37. Data Sovereignty vs Data Residency vs Data Localization (7:25)
Challenge 4
Section 5: Subject Access Requests (SARs/DSARs) - how to deal with
38. Overview of SARs (4:04)
39. How to recognize a valid SAR (8:53)
40. Responding to a SAR (6:37)
41. Dealing with SARs involving other people information- part 1 (4:43)
42. Dealing with SARs involving other people information- part 2 (4:47)
43. Supplying information to the requester (5:44)
44. Dealing with repeated or unreasonable requests (3:23)
45. Exemptions - part 1 (4:08)
46. Exemptions - part 2 (3:28)
47. Exemptions - part 3 (2:32)
Challenge 5
Section 6: IAPP exam questions analysed: CIPP/E, CIPM, CIPT
48. Read Chapter 1 & 2 from this book to pass the CIPP/E certification
49. CIPP/E scenarios - part 1 (13:16)
50. CIPP/E scenarios - part 2 (6:15)
51. CIPP/E scenarios - part 3 (10:28)
52. CIPM scenarios - part 1 (6:02)
53. CIPM scenarios - part 2 (7:37)
54. CIPM scenarios - part 3 (8:26)
55. Read this short review before going for CIPM exam
56. CIPT scenarios - part 1 (4:45)
57. CIPT scenarios - part 2 (5:29)
58. CIPT scenarios - part 3 (5:16)
Section 7: BONUS
Answers to Challenges
18. US Multinational - Technical Assessments and Data Breach
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock