Popular ISO 9001 Quality management > ISO 13485 Quality management for medical devices > ISO 14001 Environmental management > ISO 22301 Business continuity > ISO/IEC 27001 Information security > ISO 45001 (OHSAS 18001) Occupational health and safety > View all standards >
Access and buy standards How to access and buy > Decide which option works best for your business Buy standards > Standards subscriptions > BSOL > Full standards collections Compliance Navigator > Medical device standards
Standards and information Access and buy standards > Search our standards catalogue Develop a standard > Work with BSI to develop a standard Online subscription services > BSOL, Compliance Navigator, Eurocodes PLUS, BSI Membership and SCREEN
Auditing, certification and training Assessment and ISO certification > ISO certification and others eg: IATF, FSSC Auditing and verification > Supplier audits, custom audits and internal audits Product testing and certification > BSI Kitemark, CE marking and verification, Market access solutions Validate BSI-issued certificates > Check company, site and product certificates
Training courses > Individual, group and company-wide training Medical devices services > CE marking for medical devices, MDR and IVDR, quality management for medical devices Compliance software and solutions > Software tools and solutions for governance, cyber security, risk and supply chain management
Consulting practices Cybersecurity and information resilience > Environmental health and safety > Supply chain management > View all BSI services >
Industry reports, research and news Digital construction > BIM, smart cities and connected assets Future of mobility > Global market access > Health, safety and wellbeing > Information security > Cybersecurity, privacy (GDPR) and compliance
Innovation > Internet of things (IoT) > Organizational resilience > Sustainability > - Circular economy > View all topics >
About BSI > BSI impartiality > Our accreditation > Our clients and partners > Our financial information >
Our governance > Our legal information > Our purpose, mission and vision > Our Royal Charter > UK National Standards body > The global role of BSI as the national standards body >
Careers > Events and webinars > Media centre/press room > Sustainability > Modern slavery statement Contact us >
Security technology solutions > We partner with leading cloud security vendors Security testing > Vulnerability Assessment, Penetration Testing, Attack Simulation Third party security and risk assessment > Implement a robust information risk management framework
Virtual CISO > Find the right vCISO Business continuity consulting services > Make your business resilient to an ever changing and challenging world Incident management > Respond instantly to a data breach View all our cybersecurity services >
Data protection ( GDPR ) > Achieving and maintaining compliance with GDPR eDiscovery and Digital forensics > Understand and take control of your data Data subject requests (DSAR) support > Simplify, automate and reduce your response time for DSARs
DPO as a service > Quickly access to specialized, skilled and experienced consultants Article 27 Representation > Ensure your organization meets GDPR compliance obligations Data Protection Impact Assessment (DPIA) support > Minimize privacy and security risk View all our privacy and data protection solutions >
Certified information security courses > Get the skills you need to build resilience around information security management End user awareness and phishing simulations > Robust and compliant training courses
Social engineering > Recognize and avoid social engineering scams Online interactive solutions > Privacy and compliance education solutions View all our training courses >
PCI DSS > Discover our range of PCI DSS consultancy services Network and Information Systems Directive (NIS) > Achieve NIS compliance ISO/IEC 27001 consulting services > Identify and prioritize key risks across the organization
Cyber Lab (CAS, CPA, CTAS) > Carry out assessments against recognized NCSC schemes SOC 2 > Identify all services and solutions to be considered in-scope for the SOC report Internet of Things (IOT) > Enabling a smart and secure world View all our compliance services >
Certified Lead Privacy Implementer (CLPI) training course Our five-day Certified Lead Privacy Implementer course enables you to develop the expertise to implement and manage a privacy framework based on ISO 29100, the Generally Accepted Privacy principles and guidance from international information commissioners. You'll learn about best practice approaches to design, build and lead an organization's privacy program to cover business processes, ICT systems and services. This will include an understanding of a privacy framework based on common privacy terminology, the actors and their roles in processing personally identifiable information (PII), and privacy safeguarding considerations. References to known privacy principles for information technology will also be covered. By attending this course you'll develop the knowledge and skills to build privacy frameworks that help organizations maintain compliance to global privacy legislation and directives. As part of this course, you'll have the opportunity to complete the PECB Certified Lead Privacy Implementer exam, which on successful completion will gain your recognized CLPI status. Who should attend? Those with existing knowledge on the privacy framework in information security and whose responsibilities include compliance and privacy issues, such as: Security consultants and system architects Data protection and privacy officers IT developers Privacy by design responsibilities What will I learn? Day 1 Introduction to ISO 29100 privacy framework concepts ISO 29100 privacy and regulatory frameworks Fundamental principles of privacy Global privacy legislation, including new EU directives Writing a business case and a project plan for implementing a privacy framework Initiating the privacy framework implementation Day 2 Preliminary analysis of existing controls Privacy framework project leadership and approval Define the scope of a privacy framework project Develop a privacy policy Select the approach and methodology for a risk assessment Control statement and management decision to implement the privacy framework Define the organizational structure of privacy Day 3 Implement a document management framework Design controls, writing procedures and specific policies Implementing privacy controls Develop and communicate a training and awareness program on your privacy framework Incident management Operations management Day 4 Monitor, measure, analyse and evaluate Internal audit Management review Treatment of problems and points of concern Continual improvement Competence and evaluation of implementers Day 5 CLPI Certification exam How will I benefit? Understand how to design, build and lead an organization's privacy programs covering business processes, ICT systems and services Knowledge of ISO 29100 best practice privacy frameworks Be confident to develop a privacy framework that supports with compliance to privacy legislation What's included? Lunch Refreshments A certificate of attendance