Atnaujinkite slapukų nuostatas

IAPP CIPM Certified Information Privacy Manager Study Guide [Minkštas viršelis]

4.08/5 (14 ratings by Goodreads)
(University of Notre Dame),
  • Formatas: Paperback / softback, 288 pages, aukštis x plotis x storis: 229x185x18 mm, weight: 408 g
  • Išleidimo metai: 07-Feb-2023
  • Leidėjas: Sybex Inc.,U.S.
  • ISBN-10: 1394153805
  • ISBN-13: 9781394153800
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 288 pages, aukštis x plotis x storis: 229x185x18 mm, weight: 408 g
  • Išleidimo metai: 07-Feb-2023
  • Leidėjas: Sybex Inc.,U.S.
  • ISBN-10: 1394153805
  • ISBN-13: 9781394153800
Kitos knygos pagal šią temą:
An essential resource for anyone preparing for the CIPM certification exam and a career in information privacy

As cybersecurity and privacy become ever more important to the long-term viability and sustainability of enterprises in all sectors, employers and professionals are increasingly turning to IAPPs trusted and recognized Certified Information Privacy Manager qualification as a tried-and-tested indicator of information privacy management expertise.

In IAPP CIPM Certified Information Privacy Manager Study Guide, a team of dedicated IT and privacy management professionals delivers an intuitive roadmap to preparing for the CIPM certification exam and for a new career in the field of information privacy. Make use of pre-assessments, the Exam Essentials feature, and chapter review questions with detailed explanations to gauge your progress and determine where youre proficient and where you need more practice.

In the book, youll find coverage of every domain tested on the CIPM exam and those required to succeed in your firstor your nextrole in a privacy-related position. Youll learn to develop a privacy program and framework, as well as manage the full privacy program operational lifecycle, from assessing your organizations needs to responding to threats and queries.

The book also includes:





A head-start to obtaining an in-demand certification used across the information privacy industry Access to essential information required to qualify for exciting new career opportunities for those with a CIPM credential Access to the online Sybex learning environment, complete with two additional practice tests, chapter review questions, an online glossary, and hundreds of electronic flashcards for efficient studying

An essential blueprint for success on the CIPM certification exam, IAPP CIPM Certified Information Privacy Manager Study Guide will also ensure you hit the ground running on your first day at a new information privacy-related job.
Introduction xvii
Assessment Test xxvii
Chapter 1 Developing a Privacy Program
1(42)
Introduction to Privacy
3(1)
What Is Privacy?
4(1)
What Is Personal Information?
5(1)
What Isn't Personal Information?
5(3)
Why Should We Care about Privacy?
8(1)
Generally Accepted Privacy Principles
9(1)
Management
10(1)
Notice
11(1)
Choice and Consent
11(1)
Collection
12(1)
Use, Retention, and Disposal
12(1)
Access
13(1)
Disclosure to Third Parties
14(1)
Security for Privacy
14(1)
Quality
15(1)
Monitoring and Enforcement
16(1)
Developing a Privacy Program
16(1)
Crafting Vision, Strategy, Goals, and Objectives
17(3)
Structuring the Privacy Team
20(2)
Creating a Program Scope and Charter
22(3)
Privacy Roles
25(1)
Building Inventories
25(1)
Conducting a Privacy Assessment
26(1)
Implementing Privacy Controls
27(1)
Ongoing Operation and Monitoring
27(1)
Data Governance
28(1)
Data Governance Approaches
28(1)
Data Governance Roles
29(1)
Access Requirements
29(2)
Governing Information Processing
31(1)
Managing the Privacy Budget
31(1)
Organizational Budgeting
32(1)
Expense Types
32(1)
Budget Monitoring
33(1)
Communicating about Privacy
34(1)
Creating Awareness
34(1)
Building a Communications Plan
35(1)
Privacy Program Operational Life Cycle
36(1)
Summary
36(1)
Exam Essentials
37(1)
Review Questions
38(5)
Chapter 2 Privacy Program Framework
43(48)
Develop the Privacy Program Framework
44(1)
Examples of Privacy Frameworks
44(7)
Develop Privacy Policies, Procedures, Standards, and Guidelines
51(1)
Define Privacy Program Activities
52(5)
Implement the Privacy Program Framework
57(1)
Communicate the Framework
57(1)
Aligning with Applicable Laws and Regulations
58(20)
Develop Appropriate Metrics
78(1)
Identify Intended Audience for Metrics
79(1)
Define Privacy Metrics for Oversight and Governance per Audience
80(3)
Summary
83(1)
Exam Essentials
84(2)
Review Questions
86(5)
Chapter 3 Privacy Operational Life Cycle: Assess
91(24)
Document Your Privacy Program Baseline
93(1)
Education and Awareness
94(1)
Monitoring and Responding to the Regulatory Environment
94(1)
Assess Policy Compliance against Internal and External Requirements
94(1)
Data, Systems, and Process Assessment
95(1)
Risk Assessment Methods
96(1)
Incident Management, Response, and Remediation
97(1)
Perform Gap Analysis against an Accepted Standard or Law
97(1)
Program Assurance
97(1)
Processors and Third-Party Vendor Assessment
98(1)
Evaluate Processors and Third-Party Vendors
99(1)
Understand Sources of Information
99(1)
Risk Assessment
100(2)
Contractual Requirements and Ongoing Monitoring
102(1)
Physical Assessments
102(1)
Mergers, Acquisitions, and Divestitures
103(2)
Privacy Assessments and Documentation
105(1)
Privacy Threshold Analyses (PTAs)
105(1)
Define a Process for Conducting Privacy Assessments
105(3)
Summary
108(1)
Exam Essentials
108(2)
Review Questions
110(5)
Chapter 4 Privacy Operational Life Cycle: Protect
115(42)
Privacy and Cybersecurity
117(1)
Cybersecurity Goals
117(1)
Relationship between Privacy and Cybersecurity
118(1)
Cybersecurity Controls
119(1)
Security Control Categories
120(1)
Security Control Types
120(1)
Data Protection
121(1)
Data Encryption
121(1)
Data Loss Prevention
122(1)
Data Minimization
123(1)
Backups
124(1)
Policy Framework
125(1)
Cybersecurity Policies
126(2)
Cybersecurity Standards
128(1)
Cybersecurity Procedures
129(1)
Cybersecurity Guidelines
130(1)
Exceptions and Compensating Controls
131(2)
Developing Policies
133(1)
Identity and Access Management
133(1)
Least Privilege
134(1)
Identification, Authentication, and Authorization
134(1)
Authentication Techniques
135(2)
Provisioning and Deprovisioning
137(1)
Account and Privilege Management
138(1)
Privacy by Design
139(1)
Privacy and the SDLC
140(1)
System Development Phases
141(1)
System Development Models
142(4)
Integrating Privacy with Business Processes
146(1)
Vulnerability Management
146(1)
Vulnerability Scanning
147(1)
Vulnerability Remediation
147(2)
Data Policies
149(1)
Data Sharing
149(1)
Data Retention
149(1)
Data Destruction
150(1)
Summary
151(1)
Exam Essentials
151(2)
Review Questions
153(4)
Chapter 5 Privacy Operational Life Cycle: Sustain
157(18)
Monitor
158(1)
Monitoring the Environment
159(1)
Monitor Compliance with Privacy Policies
160(1)
Monitor Regulatory Changes
160(1)
Compliance Monitoring
161(1)
Audit
162(1)
Aligning with Audits
163(1)
Audit Focus
164(3)
Summary
167(1)
Exam Essentials
168(2)
Review Questions
170(5)
Chapter 6 Privacy Operational Life Cycle: Respond
175(50)
Data Subject Rights
176(1)
Access
177(1)
Managing Data Integrity
178(1)
Right of Erasure
178(2)
Right to Be Informed
180(1)
Control over Use
180(1)
Complaints
181(1)
Handling Information Requests
181(1)
Incident Response Planning
182(1)
Stakeholder Identification
182(1)
Building an Incident Oversight Team
183(1)
Building the Incident Response Plan
184(3)
Integrating the Plan with Other Functions
187(1)
Incident Detection
187(1)
Security and Privacy Incidents
187(1)
Security Events and Incidents
188(1)
Privacy Incidents
188(1)
Reporting Privacy Incidents
189(1)
Coordination and Information Sharing
190(1)
Internal Communications
191(1)
External Communications
191(1)
Breach Notification
192(1)
Incident Handling
192(1)
Risk Assessment
193(1)
Containment Activities
193(1)
Remediation Measures
194(1)
Ongoing Communications
195(1)
Post-Incident Activity
196(2)
Planning for Business Continuity
198(2)
Project Scope and Planning
200(4)
Business Impact Analysis
204(7)
Continuity Planning
211(2)
Plan Approval and Implementation
213(5)
Summary
218(1)
Exam Essentials
219(2)
Review Questions
221(4)
Appendix Answers to Review Questions
225(14)
Chapter 1 Developing a Privacy Program
226(2)
Chapter 2 Privacy Program Framework
228(1)
Chapter 3 Privacy Operational Life Cycle: Assess
229(2)
Chapter 4 Privacy Operational Life Cycle: Protect
231(2)
Chapter 5 Privacy Operational Life Cycle: Sustain
233(2)
Chapter 6 Privacy Operational Life Cycle: Respond
235(4)
Index 239
ABOUT THE AUTHORS

Mike Chapple, PhD, CIPM, is Teaching Professor of Information Technology, Analytics, and Operations at Notre Dames Mendoza College of Business. He is the bestselling author of over 25 books and serves as the Academic Director of the Universitys Master of Science in Business Analytics program.

Joe Shelley, CIPM, is the Vice President for Libraries and Information Technology at Hamilton College in New York. He oversees information security and privacy programs, IT risk management, business intelligence and analytics, and data governance.