Certified Information Privacy Manager (CIPM) Prep Course



In this course, you will gain foundational knowledge on concepts of privacy and data protection laws and practice. You will learn common principles and approaches to privacy as well as understand the major privacy models employed around the globe. An introduction to information security concepts and information security management and governance will be covered including frameworks, controls, and identity and access management. You will also learn about online privacy as it relates to using personal information on websites and other internet-related technologies.

You will learn how to create a privacy program at an organizational level, develop and implement a framework, and establish metrics to measure program effectiveness. In an interactive format applying practices to a real-world scenario, you will review privacy program practices through the privacy life cycle: assess, protect, sustain and respond.

This two-day program covering practices in managing information privacy includes:

  • Official IAPP CIPM participant guide
  • Official IAPP CIPM textbook
  • Official IAPP CIPM practice test
  • IAPP CIPM certification exam
  • IAPP membership for one year

Note: Your contact information must be provided to the IAPP and will be used by IAPP for membership services fulfillment in accordance with IAPP's policies.


Individuals who need an understanding of practices in managing information privacy and data protection and those interested in pursuing CIPM certification

Learning Objectives

  • Common principles and approaches to privacy
  • Jurisdictions and industries
  • Safeguarding personal information
  • Online privacy
  • Privacy program governance
  • Privacy operational life cycle

1. Fundamentals of Information Privacy

2. Common Principles and Approaches to Privacy

  • Modern History of Privacy
  • Types of Information
  • Risk Management Overview
  • Modern Privacy Principles

3. Jurisdictions and Industries

  • Major Privacy Models around the Globe
  • Privacy Regulation by Jurisdictions
  • Privacy Regulation by Industry Sectors

4. Information Security: Safeguarding Personal Information

  • Information Security
    • Definitions
    • Elements
    • Standards
    • Threats and Vulnerabilities
  • Information Security Management and Governance
    • Frameworks
    • Controls
    • Cryptography
    • Identity and Access Management (IAM)

5. Online Privacy: Using Personal Information and Websites and Other Internet-Related Technologies

  • Privacy Considerations for Sensitive Online Information
    • Notices
    • Access
    • Security
    • Authentication Identification
    • Data Collection
  • Additional Online Privacy
    • Children's Online Privacy
    • Online Data Collection
    • Email
    • Searches
    • Online Marketing and Advertising
    • Social Media
    • Online Assurance
    • Cloud Computing
    • Mobile Devices

6. Privacy Program Governance

  • Create a Privacy Program
    • Company Vision
    • Alignment to the Business
    • Structure a Privacy Team
  • Develop and Implement a Framework
    • Organizational Privacy Policies
    • Standards and Guidelines
  • Establish Metrics to Measure Program Effectiveness
    • Define Program Activities
    • Define Program Metrics

7. Privacy Operational Life Cycle

  • Assess
    • Document Privacy Baseline
    • Data Processors and Third Party Vendor Assessments
    • Physical Assessments
    • Mergers, Acquisitions, and Divestures
    • Privacy Threshold Analysis
    • Privacy Impact Assessments
    • Information Security Practices
  • Protect
    • Privacy by Design
    • Integrating Privacy Requirements Across the Organization
  • Sustain
    • Auditing a Privacy Program
    • Creating Awareness
    • Compliance Monitoring
  • Respond
    • Handling Information Requests
    • Handling Privacy Incidents