没有合适的资源?快使用搜索试试~ 我知道了~
CIPM注册信息隐私管理师认证考试教材 英文版
需积分: 0 1 下载量 114 浏览量
2024-04-16
14:52:51
上传
评论
收藏 3.18MB PDF 举报
温馨提示
试读
361页
IAPP(国际认证信息隐私专业人士协会)的CIPM(Certified Information Privacy Manager,认证信息隐私管理师)教材是一套专为隐私领域专业人员设计的学习资料。中文版本的CIPM教材将这一认证的核心内容进行本土化,使其更适合中文母语的学习者。 该教材详细介绍了隐私计划管理的各方面知识,包括但不限于隐私法律和规定的框架、隐私计划的创建与实施、隐私程序的运营管理、数据保护策略的制定、隐私影响评估以及如何在组织中推广隐私文化等。 通过CIPM教材的学习,候选人将掌握如何建立和维护隐私项目,以及如何衡量和改善既定隐私措施的有效性。此外,教材还充分考虑了国内外隐私保护趋势和最佳实践,为学习者提供了丰富的案例分析和实践指导。成功通过CIPM认证表示一个人已经拥有在日益重要的隐私领域中管理和运营隐私保护项目的知识和能力。
资源推荐
资源详情
资源评论
Privacy Program Management
Tools for Managing Privacy Within Your Organization
Third Edition
Executive Editor and Contributor
Russell Densmore, CIPP/E, CIPP/US, CIPM, CIPT, FIP
Contributors
Susan Bandi, CIPP/E, CIPP/US, CIPM, CIPT, FIP
João Torres Barreiro, CIPP/E, CIPP/US
John Brigagliano
Ron De Jesus, CIPP/A, CIPP/C, CIPP/E, CIPP/US, CIPM, CIPT, FIP
Jonathan Fox, CIPP/US, CIPM
Jon Neiditz, CIPP/E, CIPP/US, CIPM
Chris Pahl, CIPP/C, CIPP/E, CIPP/G, CIPP/US, CIPM, CIPT, FIP
Liisa omas
Amanda Wi, CIPP/E, CIPP/US
Edward Yakabovicz, CIPP/G, CIPM, CIPT
An IAPP Publication
©2022 by the International Association of Privacy Professionals (IAPP)
All rights reserved. No part of this publication may be reproduced, stored in a
retrieval system, or transmied in any form or by any means, mechanical,
photocopying, recording, or otherwise, without the prior wrien permission of
the publisher, International Association of Privacy Professionals, Pease
International Tradeport, 75
Rochester Ave., Portsmouth, NH 03801, United
States of America.
CIPP, CIPP/US, CIPP/C, CIPP/E, CIPP/G, CIPM, and CIPT are registered
trademarks of the International Association of Privacy Professionals, Inc.
registered in the United States. CIPP, CIPP/E, CIPM, and CIPT are also
registered in the European Union as Community Trademarks (CTM).
Indexer: Hyde Park Publishing Services
ISBN: 978-1-948771-56-6
Contents
About the IAPP
Preface
Acknowledgments
Introduction
CHAPTER 1
Introduction to Privacy Program Management
1.1 Responsibilities of a Privacy Program Manager
1.2 Accountability
1.3 Beyond Law and Compliance
1.4 Why Does an Organization Need a Privacy Program?
1.5 Privacy Across the Organization
1.6 Championing Privacy
1.7 Summary
CHAPTER 2
Privacy Program Framework: Privacy Governance
2.1 Create an Organizational Privacy Vision and Mission
Statement
2.2 Define Privacy Program Scope
2.3 Develop a Privacy Strategy
2.4 Develop and Implement a Framework
2.5 Frameworks
2.6 Privacy Technology and Governance, Risk, and Compliance Vendors and Tools
2.7 Structure the Privacy Team
2.8 Establishing the Organizational Model, Responsibilities, and Reporting Structure
2.9 Summary
CHAPTER 3
Privacy Program Framework:
Applicable Privacy Laws and Regulations
3.1 Global Privacy Laws
3.2 Self-Regulation: Industry Standards and Codes of Conduct
3.3 Cross-Border Data Transfers
3.4 Organizational Balance and Support
3.5 Understanding Penalties for Noncompliance with Laws and Regulations
3.6 Understanding the Scope and Authority of Oversight
Agencies
3.7 Other Privacy-Related Matters to Consider
3.8 Monitoring Laws and Regulations
3.9 Third-Party External Privacy Resources
3.10 Summary
CHAPTER 4
Privacy Operational Life Cycle: Assess:
Data Assessments
4.1 Data Governance
4.2 Inventories and Records
4.3 Records of Processing Activities Under the EU General Data Protection Regulation
4.4 Assessments and Impact Assessments
4.5 Physical and Environmental Assessments
4.6 Assessing Vendors
4.7 Mergers, Acquisitions, and Divestitures: Privacy
Checkpoints
4.8 Summary
CHAPTER 5
Privacy Operational Life Cycle: Protect:
Protecting Personal Information
5.1 Privacy by Design
5.2 Data Protection by Design and Default
5.3 Diagramming Privacy by Design
5.4 Information Security
5.5 Data Privacy and Information Security
5.6 Privacy Policy and Technical Controls
5.7 Summary
CHAPTER 6
Privacy Operational Life Cycle: Protect: Policies
6.1 What Is a Privacy Policy?
6.2 Privacy Policy Components
6.3 Interfacing and Communicating with an Organization
6.4 Communicating the Privacy Policy within the
Organization
6.5 Policy Cost Considerations
6.6 Design Eective Employee Policies
6.7 Procurement: Engaging Vendors
6.8 Data Retention and Destruction Policies
剩余360页未读,继续阅读
资源评论
要不要吃炸鸡
- 粉丝: 83
- 资源: 1
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功