Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
Module 4.2 Course Summary.
In this module, we're going to explore topics covered from the course
module one. Module four have to do with the intro in the summary. So I want to focus on reviewing module to in module three, or module to is the privacy strategy and program
In Module three gets into the operation elements of the privacy program
and module to. We started out by talking about the role of the privacy manager reviewed privacy manager. Job descriptions.
We talked about developing a strategy and vision for the program. Established a program, data governance model, but just how information flows in and out of our organization.
Specifically our program we define a program scope and charter,
we identified how pIA is used and applicable loss.
We also had some additional program considerations that may not have been covered in the previous modules.
Also included an introduction to ISO slash i e c 27701 And this privacy framework version one point which are
two Very new. Less than a year old
uh privacy standards and frameworks that we can use to help influence and build or reinforce our programs.
Module three again got into the operational elements where we talked about how to develop policy standards and guidelines,
talked about some supporting policies to support. Our privacy program, talked about metrics, audits and assessments.
We had a guest speaker. Our 1st 1 Bob Johnson where you talked about information disposition.
We had a discussion about security and then we had another visitor talked to us about data protection was dr lisa Dolby.
We had some vendor privacy examples. We talked about record retention, if you remember one of my favorites.
We had a retention discussion with john Montagna
and we went into education awareness, privacy by design. We talked about data subjects and we explore data subjects in the US and the EU. As a couple of examples,
we had another visitor, our last visitor information request with Monica,
incident management. Incident management roles. And instant examples were discussed.
So at some point you're going to be asked about this course and I really encourage you to give feedback on what you loved about this course.
Instructors like me love feedback
whether it's good or bad, we want to know what you love.
Also, privacy is such a broad area.
We want to know if there was something that was missing from this course.
Sai Buri has a lot of really good resources out there on the topic and this one had to do with privacy program management, which is pretty specific.
However, if you felt something needed to be included,
please let us know
in this module. We discussed why the topics in the course were chosen
and we ask for feedback about of course