CIPM: Certified Information Privacy Manager Certification Video Training Course

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
$14.99 / $24.99
Step by Step Customer Personal Data Analysis
-
1. Customer Scenario Description4m
-
2. Personal Data Analysis Form4m
-
3. Personal Data Flow Mapping and Diagrams2m
-
4. 3rd party processing providers2m
-
5. GDPR implementation project plan2m
From Small & Medium Enterprise (SME) to Multinational examples
-
1. EU SME - Business details, DPO, insourcing vs outsourcing8m
-
2. EU SME - Assessing GDPR Compliance step by step8m
-
3. EU SME - Compliance, Technical Assessment and Privacy by Design8m
-
4. EU SME - Data Transfers6m
-
5. US Multinational - Business details, DPO, insourcing vs outsourcing7m
-
6. US Multinational - Assessing GDPR Compliance step by step10m
-
7. US Multinational - Compliance with other Obligations3m
-
8. US Multinational - Technical Assessments and Data Breach11m
-
9. US Multinational - Data Transfers6m
-
10. Chrome Browser - GDPR case study8m
-
11. Top concerns for Hotels Online Businesses11m
-
12. A practical Guide for Small Enterprises (SMEs)5m
-
13. How to make a website GDPR compliant4m
-
14. Outsourcing your DPO: Real-Life Scenarios10m
-
15. Legal Response to Data Breaches in the Cloud10m
-
16. Consent to Children's Data - is it Legal?9m
-
17. GDPR Right to Erasure and Backup Systems8m
-
18. Video Surveillance Guidelines (part 1)9m
-
19. Video Surveillance Guidelines (part 2)8m
International Transfers and DPO
-
1. Mandatory and Voluntary DPO4m
-
2. International Transfers with examples9m
-
3. How do we make a restricted transfer in accordance with GDPR – adequacy decision6m
-
4. Safeguards12m
-
5. Exceptions15m
-
6. Controllers & GDPR DPOs not in the EU (LSAs examples)7m
-
7. Representatives vs DPOs11m
-
8. Data Sovereignty vs Data Residency vs Data Localization7m
Subject Access Requests (SARs/DSARs) - how to deal with
-
1. Overview of SARs4m
-
2. How to recognize a valid SAR9m
-
3. Responding to a SAR7m
-
4. Dealing with SARs involving other people information- part 15m
-
5. Dealing with SARs involving other people information- part 25m
-
6. Supplying information to the requester6m
-
7. Dealing with repeated or unreasonable requests3m
-
8. Exemptions - part 14m
-
9. Exemptions - part 23m
-
10. Exemptions - part 33m
IAPP exam questions analysed: CIPP/E, CIPM, CIPT
-
1. CIPP/E scenarios - part 113m
-
2. CIPP/E scenarios - part 26m
-
3. CIPP/E scenarios - part 310m
-
4. CIPM scenarios - part 16m
-
5. CIPM scenarios - part 28m
-
6. CIPM scenarios - part 38m
-
7. CIPT scenarios - part 15m
-
8. CIPT scenarios - part 25m
-
9. CIPT scenarios - part 35m