Training Certification


Data Protection Training

IAPP – Certified Information Privacy Management (CIPM) Training

The CIPM is the world’s first and only certification in information privacy management. When you earn a CIPM, you are demonstrating that you know how to make a privacy programme work for your organisation. With a CIPM accreditation, you will not only know about privacy regulation, but you will also know how to apply the regulations on a day to day operational basis in your organisation.

This course is ideal for DPOs and others who have responsibility for data protection compliance in their organisation. This two-day training course leads to a certification upon successful completion of the CIPM exam.

The course fee includes
  • Two full days of training (9.30 am – 5:30 pm) from Synonical Consulting IAPP Certified CIPM trainers

  • Small class size (limited to 15 delegates)

  • Lunch & Refreshments

  • Comprehensive course notes / participant guide

  • CIPM textbook (in hard copy and in soft copy format via the IAPP portal)

  • A certificate of attendance

  • One year’s membership of IAPP including online access to services via your dedicated “MyIAPP” account

  • CIPM qualification initial exam fee

  • Sample exam questions

2 What You Will Learn

Data Protection Training

Module 1: Introduction to privacy program management – Identifies privacy program management responsibilities and describes the role of accountability in privacy program management.

Module 2: Privacy governance – Examines considerations for developing and implementing a privacy program, including the position of the privacy function within the organisation, role of the DPO, program scope and charter, privacy strategy, support and ongoing involvement of key functions and privacy frameworks.

Module 3: Applicable laws and regulations – Discusses the regulatory environment, common elements across jurisdictions and strategies for aligning compliance with organisational strategy.

Module 4: Data assessments – Relates practical processes for creating and using data inventories/maps, gap analyses, privacy assessments, privacy impact assessments/data protection impact assessments and vendor assessments.

Module 5: Policies – Describes common types of privacy-related policies, outlines components and offers strategies for implementation.

Module 6: Data subjects rights – Discusses operational considerations for communicating and ensuring data subject rights, including privacy notice, choice and consent, access and rectification, data portability, and erasure and the right to be forgotten.

Module 7: Training and awareness – Online strategies for developing and implementing privacy training and awareness programs.

Module 8: Protecting personal information – Examines a holistic approach to protecting personal information through privacy by design.

Module 9: Data breach incident plans – Provides guidance on planning for and responding to a data security incident or breach.

Module 10: Measuring, monitoring and auditing program performance – Relates common practices for monitoring, measuring, analysing and auditing privacy program performance.

3 Enquire Now

Data Protection Training
Interested ? Please connect with us
Get In Touch
Privacy Settings
We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
Consent to display content from Youtube
Consent to display content from Vimeo
Google Maps
Consent to display content from Google