Domain 1—Information Privacy Governance
Establish and/or maintain an information privacy governance framework and supporting processes to ensure that the information privacy strategy is aligned with organizational goals and objectives. (24%)
Establish and/or maintain an information privacy strategy in alignment with organizational goals and objectives to guide the establishment and/or ongoing management of the information privacy programme.
Establish and/or maintain an information privacy compliance framework to guide activities that support the information privacy strategy.
Integrate information privacy governance into corporate governance to ensure that organizational goals and objectives are supported by the information privacy programme.
Establish and maintain information privacy policies to guide the development of standards, procedures and guidelines in alignment with enterprise goals and objectives.
Develop business cases to support investments in information privacy.
Identify internal and external influences to the organization (e.g., emerging technologies, social media, business environment, risk tolerance, regulatory requirements, third-party considerations, threat landscape) to ensure that these factors are continually addressed by the information privacy strategy.
Gain ongoing commitment from senior leadership and other stakeholders to support the successful implementation of the information privacy strategy.
Define, communicate, and monitor information privacy responsibilities throughout the organization (e.g., data owners, data custodians, end users, privileged or high-risk users) and lines of authority.
Establish, monitor, evaluate and report key information privacy metrics to provide management with accurate and meaningful information regarding the effectiveness of the information privacy strategy.
Required Knowledge Attainment
Knowledge of techniques used to develop an information privacy strategy (e.g., SWOT [strengths, weaknesses, opportunities, threats] analysis, gap analysis, threat research)
Knowledge of the relationship of information privacy to business goals, objectives, functions, processes and practices
Knowledge of available information privacy governance frameworks (the PCF, ISO27018)
Knowledge of globally recognized standards, frameworks and industry best practices related to information privacy governance and strategy development
Knowledge of the fundamental concepts of governance and how they relate to information privacy
Knowledge of methods to assess, plan, design and implement an information privacy governance framework
Knowledge of methods to integrate information privacy governance into corporate governance
Knowledge of content in, and techniques to develop, business cases
Knowledge of strategic budgetary planning and reporting methods
Knowledge of the internal and external influences to the organization (e.g., emerging technologies, social media, business environment, risk tolerance, regulatory requirements, third-party considerations, threat landscape) and how they impact the information privacy strategy
Knowledge of key information needed to obtain commitment from senior leadership and support from other stakeholders (e.g., how information privacy supports organizational goals and objectives, criteria for determining successful implementation, business impact)
Knowledge of methods and considerations for communicating with senior leadership and other stakeholders (e.g., organizational culture, channels of communication, highlighting essential aspects of information privacy)
Knowledge of roles and responsibilities of the information privacy manager
Knowledge of organizational structures, lines of authority and escalation points
Knowledge of information privacy responsibilities of staff across the organization (e.g., data owners, end users, privileged or high-risk users)
Knowledge of processes to monitor performance of information privacy responsibilities
Knowledge of methods to establish new, or utilize existing, reporting and communication channels throughout an organization
Knowledge of methods to select, implement and interpret key information privacy metrics (e.g., key performance indicators [KPIs] or key risk indicators [KRIs])
Domain 2—Information Risk Management
Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives. (30%)
Establish and/or maintain a process for information asset classification to ensure that measures taken to protect assets are proportional to their business value.
Identify legal, regulatory, organizational and other applicable requirements to manage the risk of noncompliance to acceptable levels.
Ensure that Privacy Impact Analyses, Information risk assessments, vulnerability assessments and threat analyses are conducted consistently, at appropriate times, and to identify and assess risk to the organization’s information.
Identify, recommend or implement appropriate risk treatment/response options to manage risk to acceptable levels based on organizational risk appetite.
Determine whether information privacy controls are appropriate and effectively manage risk to an acceptable level.
Facilitate the integration of information risk management into business and IT processes (e.g., systems development, procurement, project management) to enable a consistent and comprehensive information risk management programme across the organization.
Monitor for internal and external factors (e.g., key risk indicators [KRIs], threat landscape, geopolitical, regulatory change) that may require reassessment of risk to ensure that changes to existing, or new, risk scenarios are identified and managed appropriately.
Report noncompliance and other changes in information risk to facilitate the risk management decision-making process.
Ensure that information privacy risk is reported to senior management to support an understanding of potential impact on the organizational goals and objectives.
Required Knowledge Attainment
Knowledge of methods to establish an information asset classification model consistent with business objectives
Knowledge of considerations for assigning ownership of information assets and risk
Knowledge of methods to identify and evaluate the impact of internal or external events on information assets and the business
Knowledge of methods used to monitor internal or external risk factors
Knowledge of information asset valuation methodologies
Knowledge of legal, regulatory, organizational and other requirements related to information privacy
Knowledge of reputable, reliable and timely sources of information regarding emerging information privacy threats and vulnerabilities
Knowledge of events that may require risk reassessments and changes to information privacy programme elements
Knowledge of information threats, vulnerabilities and exposures and their evolving nature
Knowledge of risk assessment and analysis methodologies
Knowledge of methods used to prioritize risk scenarios and risk treatment/response options
Knowledge of risk reporting requirements (e.g., frequency, audience, content)
Knowledge of risk treatment/response options (avoid, mitigate, accept or transfer) and methods to apply them
Knowledge of control baselines and standards and their relationships to risk assessments
Knowledge of information privacy controls and the methods to analyse their effectiveness
Knowledge of gap analysis techniques as related to information privacy
Knowledge of techniques for integrating information privacy risk management into business and IT processes
Knowledge of compliance reporting requirements and processes
Knowledge of cost/benefit analysis to assess risk treatment options
Domain 3—Information Privacy Programme Development and Management
Develop and maintain an information privacy programme that identifies, manages and protects the organization’s assets while aligning to information privacy strategy and business goals, thereby supporting an effective privacy posture. (27%)
Establish and/or maintain the information privacy programme in alignment with the information privacy strategy.
Align the information privacy programme with the operational objectives of other business functions (e.g., human resources [HR], accounting, procurement and IT) to ensure that the information privacy programme adds value to and protects the business.
Identify, acquire and manage requirements for internal and external resources to execute the information privacy programme.
Establish and maintain information privacy processes and resources (including people and technologies) to execute the information privacy programme in alignment with the organization’s business goals.
Establish, communicate and maintain organizational information privacy standards, guidelines, procedures and other documentation to guide and enforce compliance with information privacy policies.
Establish, promote and maintain a programme for information privacy awareness and training to foster an effective privacy culture.
Integrate information privacy requirements into organizational processes (e.g., change control, mergers and acquisitions, system development, business continuity, disaster recovery) to maintain the organization’s privacy strategy.
Integrate information privacy requirements into contracts and activities of third parties (e.g., joint ventures, outsourced providers, business partners, customers) and monitor adherence to established requirements in order to maintain the organization’s privacy strategy.
Establish, monitor and analyse programme management and operational metrics to evaluate the effectiveness and efficiency of the information privacy programme.
Compile and present reports to key stakeholders on the activities, trends and overall effectiveness of the Privacy programme and the underlying business processes in order to communicate privacy performance.
Required Knowledge Attainment
Knowledge of methods to align information privacy programme requirements with those of other business functions
Knowledge of methods to identify, acquire, manage and define requirements for internal and external resources
Knowledge of current and emerging information privacy technologies and underlying concepts
Knowledge of methods to design and implement information privacy controls
Knowledge of information privacy processes and resources (including people and technologies) in alignment with the organization’s business goals and methods to apply them
Knowledge of methods to develop information privacy standards, procedures and guidelines
Knowledge of internationally recognized regulations, standards, frameworks and best practices related to information privacy programme development and management
Knowledge of methods to implement and communicate information privacy policies, standards, procedures and guidelines
Knowledge of training, certifications and skill set development for information privacy personnel
Knowledge of methods to establish and maintain effective information privacy awareness and training programmes
Knowledge of methods to integrate information privacy requirements into organizational processes (e.g., access management, change management, audit processes)
Knowledge of methods to incorporate information privacy requirements into contracts, agreements and third-party management processes
Knowledge of methods to monitor and review contracts and agreements with third parties and associated change processes as required
Knowledge of methods to design, implement and report operational information privacy metrics
Knowledge of methods for testing the effectiveness and efficiency of information privacy controls
Knowledge of techniques to communicate information privacy programme status to key stakeholders
Domain 4—Information Privacy Incident Management
Plan, establish and manage the capability to detect, investigate, respond to and recover from information privacy incidents to minimize business impact. (19%)
Establish and maintain an organizational definition of, and severity hierarchy for, information privacy incidents to allow accurate classification and categorization of and response to incidents.
Establish and maintain an incident response plan to ensure an effective and timely response to information privacy incidents.
Develop and implement processes to ensure the timely identification of information privacy incidents that could impact the business.
Establish and maintain processes to investigate and document information privacy incidents in order to determine the appropriate response and cause while adhering to legal, regulatory and organizational requirements.
Establish and maintain incident notification and escalation processes to ensure that the appropriate stakeholders are involved in incident response management.
Organize, train and equip incident response teams to respond to information privacy incidents in an effective and timely manner.
Test, review and revise (as applicable) the incident response plan periodically to ensure an effective response to information privacy incidents and to improve response capabilities.
Establish and maintain communication plans and processes to manage communication with internal and external entities.
Conduct post-incident reviews to determine the root cause of information privacy incidents, develop corrective actions, reassess risk, evaluate response effectiveness and take appropriate remedial actions.
Establish and maintain integration among the incident response plan, business continuity plan and disaster recovery plan.
Required Knowledge Attainment
Knowledge of incident management concepts and practices
Knowledge of the components of an incident response plan
Knowledge of business continuity planning (BCP) and disaster recovery planning (DRP) and their relationship to the incident response plan
Knowledge of incident classification/categorization methods
Knowledge of incident containment methods to minimize adverse operational impact
Knowledge of notification and escalation processes
Knowledge of the roles and responsibilities in identifying and managing information privacy incidents
Knowledge of the types and sources of training, tools and equipment required to adequately equip incident response teams
Knowledge of forensic requirements and capabilities for collecting, preserving and presenting evidence (e.g., admissibility, quality and completeness of evidence, chain of custody)
Knowledge of internal and external incident reporting requirements and procedures
Knowledge of post-incident review practices and investigative methods to identify root causes and determine corrective actions
Knowledge of techniques to quantify damages, costs and other business impacts arising from information privacy incidents
Knowledge of technologies and processes to detect, log, analyse and document information privacy events
Knowledge of internal and external resources available to investigate information privacy incidents
Knowledge of methods to identify and quantify the potential impact of changes made to the operating environment during the incident response process
Knowledge of techniques to test the incident response plan
Knowledge of applicable regulatory, legal and organization requirements
Knowledge of key indicators/metrics to evaluate the effectiveness of the incident response plan
- Additional Information
START DATE Apr 9, 2018 END DATE Aug 11, 2019 City London