CIPM Certified Information Privacy Manager All-In-One Exam Guide
This self-study guide covers every topic on the Certified Information Privacy Manager exam Take IAPP's rigorous Certified Information Privacy Manager (CIPM) exam with complete confidence using the comprehensive information contained in this highly effective study guide. The book enhances candid...
Call Number: | Libro Electrónico |
---|---|
Main Author: | |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
New York :
McGraw-Hill Education,
2021.
|
Subjects: | |
Online Access: | Texto completo (Requiere registro previo con correo institucional) |
Table of Contents:
- Cover
- Title Page
- Copyright Page
- Dedication
- Contents at a Glance
- Contents
- Acknowledgments
- Introduction
- Chapter 1 Developing a Privacy Program
- The Privacy Vision
- Establish a Data Governance Model
- Establish a Privacy Program
- Structure the Privacy Team
- Privacy Program Communications
- Chapter Review
- Chapter 2 Privacy Program Framework
- Develop the Privacy Program Framework
- Implement the Privacy Program Framework
- Privacy Program Metrics
- Online Tracking and Behavioral Profiling
- Chapter Review
- Chapter 3 Privacy Operational Lifecycle: Assess
- Privacy Program Baseline
- Third-Party Risk Management
- Physical Assessments
- Mergers, Acquisitions, and Divestitures
- Privacy Impact Assessments and Data Privacy Impact Assessments
- Chapter Review
- Chapter 4 Privacy Operational Lifecycle: Protect
- Information Security Practices
- Integrating Privacy into Organization Operations
- Other Protection Measures
- Chapter Review
- Chapter 5 Privacy Operational Lifecycle: Sustain
- Monitoring a Privacy Program
- Auditing Privacy Programs
- Chapter Review
- Chapter 6 Privacy Operational Lifecycle: Respond
- Data Subject Requests and Privacy Rights
- Privacy Incident Response
- Privacy Continuous Improvement
- Chapter Review
- Appendix A The Risk Management Life Cycle
- The Risk Management Process
- Risk Management Methodologies
- Asset Identification
- Asset Classification
- Asset Valuation
- Threat Identification
- Vulnerability Identification
- Risk Identification
- Risk, Likelihood, and Impact
- Risk Analysis Techniques and Considerations
- Appendix B About the Online Content
- System Requirements
- Your Total Seminars Training Hub Account
- Single User License Terms and Conditions
- TotalTester Online
- Technical Support
- Glossary
- Index.