Oreilly - General Data Protection Regulation Practitioner
by CyberTraining 365 | Released February 2019 | ISBN: 9781838644031
Implement and manage a compliance framework with regard to the protection of personal data.About This VideoLearn the processes to manage a team implementing the GDPRThis course will enable delegates to fulfill the Data Protection Officer (DPO) role under the EU GDPRIn DetailThe Practitioner Training Certificate (GDPR P) is the qualification for those undertaking the role of Data Protection Officer under the new General Data Protection Regulations. Suitable for the public and private sector, this course will teach delegates essential GDPR skills and knowledge. It enables you to develop the necessary knowledge, skills, and competence to effectively implement and manage a compliance framework with regard to the protection of personal data.The Practitioner Training Certificate (GDPR P) is focused on enabling delegates to fulfill the role of Data Protection Officer (DPO) under the EU GDPR, and covers the regulations in depth, including implementation requirements, necessary policies and processes, and important elements of effective data security management.All the codes and supporting files for this course are available at: https://github.com/PacktPublishing/General-Data-Protection-Regulation-Practitioner-GDPR-P-Downloading the example code for this course: You can download the example code files for all Packt video courses you have purchased from your account at http://www.PacktPub.com. If you purchased this course elsewhere, you can visit http://www.PacktPub.com/support and register to have the files e-mailed directly to you. Show and hide more
- Chapter 1 : Initiation to GDPR Compliance
- Foundation of Modern Privacy Law 00:10:38
- Modern Privacy Law Could – and – Should Achieve 00:07:58
- Modern Privacy Law and Realistic Restrictions 00:05:46
- Legal Requirements of the EU GDPR – 1 00:09:35
- Legal Requirements of the EU GDPR – 2 00:06:46
- Legal Requirements of the EU GDPR – 3 00:08:29
- Legal Requirements of the EU GDPR – 4 00:06:54
- Legal Requirements of the EU GDPR – 5 00:06:51
- Legal Requirements of the EU GDPR – 6 00:07:10
- Legal Requirements of the EU GDPR – 7 00:06:19
- Consent in a Nutshell 00:13:27
- Consent a Big Change 00:12:52
- Why is Consent Important and its Benefits 00:11:09
- What Does GDPR Mean for Your Data? 00:12:00
- Explicit Consent 00:09:15
- How Should You Obtain, Record and Manage Consent? 00:13:35
- Consent Checklists 00:08:34
- Chapter 2 : Plan to Implement GDPR
- Prepare for the GDPR 00:06:13
- Prepare for the GDPR - Steps 3 & 4 00:04:27
- Prepare for the GDPR - Steps 5 & 6 00:06:43
- Privacy Compliance Framework 00:04:50
- Key Areas of a Privacy Compliance Framework 00:07:06
- Governance in Privacy Compliance Framework 00:04:35
- Key Processes Under Privacy Framework & Incident Management 00:07:56
- Key Role in Incident Management and Incident Response Plans 00:06:12
- Change Management, Corrective Action and Risk Management 00:05:48
- Continual Improvement, GDPR & the Brexit 00:05:38
- Personal Information Management Systems 00:06:39
- Selecting and Implementing a Compliance Framework 00:05:04
- Obligations of Controllers 00:10:24
- Chapter 3 : Deploying the GDPR
- GDPR Accountability Principle 00:06:12
- Phase I: Prepare Part 1 00:06:07
- Phase I: Prepare Part 2 00:06:45
- Phase I: Prepare Part 3 00:08:47
- Phase II: Operate Part 1 00:07:33
- Phase II: Operate Part 2 00:08:04
- Phase III: Maintain Part 1 00:07:59
- Phase III: Maintain Part 2 00:04:03
- International Transfer 00:09:02
- Derogations for Specific Situations 00:11:09
- Adequacy Regimes - BCRs, SCCs, Privacy Shield 00:15:07
- Data Protection and the Cloud 00:13:41
- Mitigating Security Risks In The Cloud 00:06:39
- Checklist of Deploying the GDPR 00:07:29
- Chapter 4 : Monitoring for Continuous improvement of GDPR Compliance
- Monitoring for Continuous Improvement 00:09:17
- Privacy and Monitoring at Work 00:07:29
- Steps: Monitoring Employees 00:06:29
- Permitted Data Monitoring Processes 00:07:56
- Systems for Monitoring Communications 00:09:10
- Data Breaches & the Chain Reaction 00:10:06
- Avoiding Data Breaches 00:08:20
- Vulnerability Assessment 00:07:34
- Vulnerability Management & Remediation 00:10:13
- Steps for Vulnerability Management 00:10:43
- Reducing Vulnerabilities 00:09:39
- Manage Risk by Continual Monitoring 00:10:25
- Data Mapping 00:14:48
- Course Summary 00:03:20
Show and hide more