CIPM Certified Information Privacy Manager All-in-One Exam Guide
Autor Peter Gregoryen Limba Engleză Paperback – 7 iul 2021
Take IAPP’s rigorous Certified Information Privacy Manager (CIPM) exam with complete confidence using the comprehensive information contained in this highly effective study guide. The book enhances candidates’ abilities to design, build, and run information privacy management programs.
Written by a security and privacy expert and experienced author, CIPM Certified Information Privacy Manager All-in-One Exam Guide is based on proven pedagogy and thoroughly prepares candidates to pass this exam. Beyond exam preparation, the guide also serves as a valuable on-the-job reference.
•Provides 100% coverage of all eight objectives for the CIPM exam
•Online content includes 300 practice questions in the Total Tester exam engine
•Written by a security and privacy expert, educator, and experienced author
Preț: 276.24 lei
Preț vechi: 345.30 lei
-20% Nou
Puncte Express: 414
Preț estimativ în valută:
52.87€ • 55.59$ • 43.98£
52.87€ • 55.59$ • 43.98£
Carte disponibilă
Livrare economică 07-21 decembrie
Livrare express 23-29 noiembrie pentru 37.32 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781260474091
ISBN-10: 1260474097
Pagini: 400
Dimensiuni: 185 x 231 x 25 mm
Greutate: 0.62 kg
Editura: McGraw Hill Education
Colecția McGraw-Hill
Locul publicării:United States
ISBN-10: 1260474097
Pagini: 400
Dimensiuni: 185 x 231 x 25 mm
Greutate: 0.62 kg
Editura: McGraw Hill Education
Colecția McGraw-Hill
Locul publicării:United States
Cuprins
Introduction
Chapter 1 Developing a Privacy Program
The Privacy Vision
Establish a Data Governance Model
Establish a Privacy Program
Structure the Privacy Team
Privacy Program Communications
Chapter Review
Chapter 2 Privacy Program Framework
Develop the Privacy Program Framework
Implement the Privacy Program Framework
Privacy Program Metrics
Online Tracking and Behavioral Profiling
Chapter Review
Chapter 3 Privacy Operational Lifecycle: Assess
Privacy Program Baseline
Third-Party Risk Management
Physical Assessments
Mergers, Acquisitions, and Divestitures
Privacy Impact Assessments and Data Privacy Impact Assessments
Chapter Review
Chapter 4 Privacy Operational Lifecycle: Protect
Information Security Practices
Integrating Privacy into Organization Operations
Other Protection Measures
Chapter Review
Quick Review
Chapter 5 Privacy Operational Lifecycle: Sustain
Monitoring a Privacy Program
Auditing Privacy Programs
Chapter Review
Chapter 6 Privacy Operational Lifecycle: Respond
Data Subject Requests and Privacy Rights
Privacy Incident Response
Privacy Continuous Improvement
Chapter Review
Appendix A The Risk Management Life Cycle
The Risk Management Process
Risk Management Methodologies
Asset Identification
Asset Classification
Asset Valuation
Threat Identification
Vulnerability Identification
Risk Identification
Risk, Likelihood, and Impact
Likelihood
Impact
Risk Analysis Techniques and Considerations
Appendix B About the Online Content
System Requirements
Your Total Seminars Training Hub Account
Single User License Terms and Conditions
TotalTester Online
Technical Support
Glossary
Index
Chapter 1 Developing a Privacy Program
The Privacy Vision
Establish a Data Governance Model
Establish a Privacy Program
Structure the Privacy Team
Privacy Program Communications
Chapter Review
Chapter 2 Privacy Program Framework
Develop the Privacy Program Framework
Implement the Privacy Program Framework
Privacy Program Metrics
Online Tracking and Behavioral Profiling
Chapter Review
Chapter 3 Privacy Operational Lifecycle: Assess
Privacy Program Baseline
Third-Party Risk Management
Physical Assessments
Mergers, Acquisitions, and Divestitures
Privacy Impact Assessments and Data Privacy Impact Assessments
Chapter Review
Chapter 4 Privacy Operational Lifecycle: Protect
Information Security Practices
Integrating Privacy into Organization Operations
Other Protection Measures
Chapter Review
Quick Review
Chapter 5 Privacy Operational Lifecycle: Sustain
Monitoring a Privacy Program
Auditing Privacy Programs
Chapter Review
Chapter 6 Privacy Operational Lifecycle: Respond
Data Subject Requests and Privacy Rights
Privacy Incident Response
Privacy Continuous Improvement
Chapter Review
Appendix A The Risk Management Life Cycle
The Risk Management Process
Risk Management Methodologies
Asset Identification
Asset Classification
Asset Valuation
Threat Identification
Vulnerability Identification
Risk Identification
Risk, Likelihood, and Impact
Likelihood
Impact
Risk Analysis Techniques and Considerations
Appendix B About the Online Content
System Requirements
Your Total Seminars Training Hub Account
Single User License Terms and Conditions
TotalTester Online
Technical Support
Glossary
Index