Certified Information Privacy Technologist training course

The Certified Information Privacy Technologist (CIPT) is the first and only certification of its kind worldwide. It was launched by the International Association of Privacy Professionals (IAPP) in 2014 to meet the growing need that only tech pros can fill - securing data privacy at all stages of IT product and service lifecycles.

The CIPT credential shows you’ve got the knowledge to build your organization’s data protection structures from the ground up. With regulators worldwide calling for tech professionals to factor data protection into their products and services, the job market for privacy-trained IT pros has never been stronger.

Whether you work in the public or private sector, data privacy skills are quickly becoming a must-have.

The CIPT certification also holds accreditation under ISO 17024: 2012.


Who should attend?

This course is designed for individuals with some experience in information security, whose work relates to the processing of personal data, including:

  • Data Protection Officers
  • IT Managers and Administrators
  • Record Managers
  • System Developers
  • IT Security Specialists
  • Anyone who builds and develops IT systems

What will I learn?

  • Critical data protection concepts and practices that impact IT 
  • Consumer data protection expectations and responsibility
  • How to bake privacy into early stages of IT products and services for cost control, accuracy
        and speed-to-market
  • How to establish data protection practices for data collection and transfer
  • How to preempt data protection issues in the Internet of Things
  • How to factor data protection into data classification and emerging tech such as cloud
        computing, facial recognition and surveillance
  • How to communicate data protection issues with partners such as management, development,
        marketing and legal
  • How will I benefit?

  • Be recognized as a leading professional in information security
  • Gain the confidence to interpret privacy regulations and ensure best practice techniques are embedded into your IT infrastructure
  • Greater ability to identify potential impacts of privacy on IT products and services at the beginning
    of their lifecycle
  • What is included?

  • Lunch
  • Refreshments
  • Comprehensive course notes
  • A certificate of attendance