Get in Touch

Course Outline

Day I

I. Selecting a Personal Data Protection Management Model
1. Prerequisites for an effective data protection system
2. Existing data protection governance models
3. Division of roles and responsibilities in data protection processes.

II. Duties and Responsibilities of the Data Protection Officer (DPO)
1. Mandatory appointment of a Data Protection Officer
2. Optional appointment of an Inspector
3. Essential knowledge required for the DPO
4. Resources for gaining knowledge
5. Qualifications to act as an Inspector
6. Forms of employment for the Supervisor
7. Professional development for the DPO
8. DPO tasks

III. Dataflows
1. What the DPO needs to know about data flows
2. Capabilities expected of a DPO
3. DPO tasks in this context.

IV. Preparing and Conducting an Audit
1. Pre-audit preparatory activities
2. Developing an audit plan
3. Assigning tasks to the audit team
4. Creating working documents
5. Audit checklist
6. Case study: The auditing process course.

V. Assessing the Degree of Compliance
1. Key considerations:
2. Processing security
3. Legal grounds for processing
4. Principle of consent
5. Principle of data minimization
6. Principle of transparency
7. Entrustment of processing
8. Transferring data to third countries and international transfers.

VI. Audit Report
1. Preparing an audit report
2. Audit Report contents
3. Key areas of attention
4. Case study
5. Employee cooperation – building awareness
6. Verifying CPU warranty.

VII. Maintaining Compliance
1. Employee awareness – a critical issue
2. Data Protection Policy
3. Essential, minimal documentation
4. Continuous monitoring

Day II

VIII. Introduction to Risk Management
1. Organizing the risk assessment process
2. Selected risk assessment practices
3. Essential elements of a DPIA

IX. Examining the Context of Personal Data Processing
1. Contextual research exercises
2. External context
3. Internal context
4. Common mistakes

X. Data Protection Impact Assessment (DPIA)
1. Purpose of execution
2. When a DPIA is obligatory vs. when it is not
3. Necessary elements of the process
4. Inventory of processing activities
5. Identification of processing resources, particularly those with high risk

XI. Risk Analysis Exercises
1. Estimating the probability of hazard occurrence
2. Identifying vulnerabilities and existing security measures
3. Identifying effectiveness
4. Estimating consequences
5. Risk identification
6. Determining the risk level
7. Determining the risk acceptability threshold

XII. Asset Identification and Security Exercises
1. Determining the process risk value for the resource
2. Estimating the probability of hazard occurrence
3. Vulnerability identification
4. Identification of existing safeguards
5. Estimating consequences
6. Risk identification
7. Determining the risk acceptability threshold

Requirements

Target Audience

  • Individuals serving as Data Protection Officers
  • Anyone interested in expanding their knowledge in this field
 14 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories