WHY NOW?
Today's privacy practitioners must wear different hats. Contributions need to be as much about ensuring compliance with new laws and regulations, as it is about meeting growing consumer privacy concerns. As shown below, a majority of consumers care about their privacy and are willing to act upon it. They are willing to switch companies or providers to better protect their privacy.
Consumer Shift
Privacy concerns have deep roots. Nearly 68% of consumers throughout the world said they are either somewhat or very concerned about their online privacy. This concern affects how much they trust companies, organizations and governments to collect, hold and use their personal data. Consumers make choices based on their perceptions of privacy, adjusting their compasses in a world awash in data by deleting apps, withholding information and avoiding purchases when they feel their privacy is at risk.
Privacy practitioners involved in product development are therefore expected to add value to the business. They must develop stakeholder relationships that are centred less around fines and penalties, and more on lifting consumer retention and loyalty. This necessary and timely transformation, is at the heart of the new ISO31700 Privacy by Design standard.
WHAT IS THE NEW STANDARD ABOUT?
Consumer Centricity
Getting Views & Preferences
Getting consumer views provides several clear benefits. First and most importantly, practitioners will be able to tell if the privacy protections implemented, are actually working as intended. Second, the insights gained can help build an evidence based approach to improvements. Third, such insights will likely also be of interest and benefit to other stakeholders. Sharing it will help the organisation realise the depth of impact consumer privacy awareness is truly having on the business.
Stakeholders
Multidisciplinary Approach
The standard very much acknowledges the need for and assumes a multi-disciplinary approach to integrating privacy controls into products. With practices such as ‘dark patterns’ on the regulatory radar, embedding cross collaborations with technical experts, such as user experience designers and data specialists, has never been more important.
Use Cases
Maintaining a Balanced Focus
Use cases allow privacy practitioners to have constructive discussions around product impacts holistically. This is especially important when contextual factors in innovative business models, third party data sharing and emerging technologies are raised.
Measurable
Managing what you measure
A practical and needed modernisation brought by the standard, is its requirement for Privacy by Design programs to establish measurement methods and metrics, in deployment and operations.
WHAT IS IN THE COURSE?
Practical Skills
Step by Step Program
The Privacy By Design Lead course is designed for anyone looking to implement the ISO 31700 Privacy By Design standard in their organisation. It assumes no previous knowledge and covers the following topics
- What is Privacy by Design?
- Why is Privacy By Design important?
- The ISO 31700 standard
- Program Requirements
- Managing Communications
- Risk Management
- Privacy Controls
- End of Life Product Management
We suggest you also purchase the ISO31700 Program Templates to go along with the course, especially if you want to get started immediately. It will help turn many of the concepts discussed into concrete examples at your organisation.
A certificate is awarded upon successful completion of the course. Completely online and on demand, the course can be undertaken anytime, anywhere.
Extra help getting started
All your documentation sorted
Designed to be a companion piece to the Privacy By Design Lead course, it includes the
* Privacy Program
* Communications Plan
* Risk Management Plan
* Privacy Controls Plan
* Product End Of Life PlanDevelop Supporting Evidence for Your Privacy Program
- Measure the effectiveness of your privacy program, customer privacy preferences and its impact on the business
- Develop evidence to support a business proposal and/or to justify your privacy program initiatives
- Gain traction at the executive table, by shifting the focus of your privacy program from that of compliance, to helping the business develop consumer trust and brand loyalty
Get data stakeholders on board
This course is designed to help provide Data Specialists with background information on guiding principles when contributing to designing privacy controls.
Get user experience stakeholders on board
This course is designed to help provide User Experience Specialists with background information on guiding principles when contributing to designing privacy controls.
Developed with Privacy Expertise
The course was developed by Christopher Tia - CIPP/US, CIPP/E, CIPT and certified ISO27001 Internal Auditor, NIST CSF, COBIT, OneTrust Professional and Advanced SOC.
Christopher is Principal of Lean Prototype Machine, a boutique privacy and information security compliance consulting service. We work with high growth companies that are looking to implement ISO27001, SOC, NIST CSF or comply with the CCPA, HIPAA and GDPR.
Christopher Tia
Principal
Chris is an experienced digital data technologist specialising in privacy and data protection solutions. He helps organisations
- Manage online risk to protect business reputation, continuity and consumer trust
- Integrate governance processes, benchmarks & standards to protect digital & data assets
- Initiate strategic change by increasing awareness of data protection policies, obligations & best practices
- Automate privacy operations to meet regulatory requirements and demonstrate compliance
Chris has an extensive background in system analysis, technical infrastructure design and applications development - with hands on experience across varied technologies including telecommunications, high availability systems, eCommerce, RPA, Process Mining, data analytics, API micro-services and cloud based platforms.
B. Science (Computer Science), B. Laws (Hons), M. Commerce, Grad Dip (Legal Practice)
Frequently Asked Questions
What do I get when I enroll in the course?
You get access to all course materials when you enroll. This consists of 3 separate modules. You will also get access to the slide decks used throughout the course. Upon completion, you will receive a course certificate.
How long is the course?
Altogether, the course should take approximately 30-40 minutes to complete. Each module is however designed to help you set up a Privacy by Design program, step by step. We thus suggest you consider what actions you need to take in your organisation, before you move onto the next module.
Are there specific enrollment dates?
The course is provided on-demand so you can do it anytime.
Can the course be reimbursed by my company or claimed as a tax expense?
A tax invoice is provided when you enroll so you should be able to get the training reimbursed by your company or write it off as a training expense.
Do I need to buy anything special or additional to make the course useful?
We suggest you also purchase the ISO31700 Program Templates to go along with the course, especially if you want to get started immediately. It will help turn many of the concepts discussed into concrete examples at your organisation.
Does the course cover the 7 original principles of Privacy by Design by Dr Ann Cavoukian?
Yes it does. The course includes a discussion of its strengths and weaknesses, to help you better understand why the new standard is the next logical evolution of the approach.
We have helped ... a trusted infrastructure consulting firm, who partners with clients to solve the world’s most complex challenges and build legacies for generations to come.
We have helped ... a provider of the most advanced body composition scanner on the market, offering a full digital solution for the health and fitness industry.
Have a Question ?
Schedule a time to have a quick chat.
© 2023