CIPM Certified Information Privacy Manager All-In-One Exam Guide
This self-study guide covers every topic on the Certified Information Privacy Manager exam Take IAPP's rigorous Certified Information Privacy Manager (CIPM) exam with complete confidence using the comprehensive information contained in this highly effective study guide. The book enhances candid...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York :
McGraw-Hill Education,
2021.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Dedication
- Contents at a Glance
- Contents
- Acknowledgments
- Introduction
- Chapter 1 Developing a Privacy Program
- The Privacy Vision
- Establish a Data Governance Model
- Establish a Privacy Program
- Structure the Privacy Team
- Privacy Program Communications
- Chapter Review
- Chapter 2 Privacy Program Framework
- Develop the Privacy Program Framework
- Implement the Privacy Program Framework
- Privacy Program Metrics
- Online Tracking and Behavioral Profiling
- Chapter Review
- Chapter 3 Privacy Operational Lifecycle: Assess
- Privacy Program Baseline
- Third-Party Risk Management
- Physical Assessments
- Mergers, Acquisitions, and Divestitures
- Privacy Impact Assessments and Data Privacy Impact Assessments
- Chapter Review
- Chapter 4 Privacy Operational Lifecycle: Protect
- Information Security Practices
- Integrating Privacy into Organization Operations
- Other Protection Measures
- Chapter Review
- Chapter 5 Privacy Operational Lifecycle: Sustain
- Monitoring a Privacy Program
- Auditing Privacy Programs
- Chapter Review
- Chapter 6 Privacy Operational Lifecycle: Respond
- Data Subject Requests and Privacy Rights
- Privacy Incident Response
- Privacy Continuous Improvement
- Chapter Review
- Appendix A The Risk Management Life Cycle
- The Risk Management Process
- Risk Management Methodologies
- Asset Identification
- Asset Classification
- Asset Valuation
- Threat Identification
- Vulnerability Identification
- Risk Identification
- Risk, Likelihood, and Impact
- Risk Analysis Techniques and Considerations
- Appendix B About the Online Content
- System Requirements
- Your Total Seminars Training Hub Account
- Single User License Terms and Conditions
- TotalTester Online
- Technical Support
- Glossary
- Index.