EXCEPTIONAL TRAINING COURSES FOR IT PROFESSIONALS
LONDON UK | ONSITE | ONLINE


GDPR for IT & Software Professionals Training Course


Capita Marks and Spencer Telefonica Cisco BBC Lloyds Sony

GDPR for IT & Software Professionals training course (code: GDPRDEV)

What will the GDPR mean for your organisation's Software Development Lifecycle? Start on the journey to compliance and Learn the tools and technologies available to help?


SEE MORE COURSES IN THIS CATEGORY

TRAINING COURSE OVERVIEW

Our GDPR training course is aimed at IT and Software Professionals, who need to understand the impact of new EU legistlation and how to navigate the software development life cycle under the GDPR

Developed in response to the biggest shake up in European data protection and privacy for over two decades, this course prepares you to take the necessary steps to protect business continuity and strengthen organisational reputation in the UK and beyond.

The GDPR (General Data Protection Regulation) requires substantial work to assess the risks and implement new controls before it enters into law. This course will equip individuals and organisations with a solid knowledge of the practical implications of the GDPR which could ultimately avoid heavy fines and reputational damage.

Keep the course general or tailor it to your organisation, starting with a 1 day overview with follow-on sessions in which different business functions can realise the impact of GDPR more specifically.

Sit an optional exam and gain appropriate certification


AUDIENCE

IT and Software Professionals  who need to understand and learn how to tackle the implications of GDPR on their organisation.




DETAILHIGHLIGHTS

Our course will address the following inventory of 16 areas of pertinent GDPR Recitals and Articles that influence the SDLC’s Functional and Technical Planning and Requirements for IT departments. This list will be helpful to general counsels, CIOs and leaders of IT as they compile their system’s requirements for their EU groups:

1.) Implementing data protection in the system and the organization, by design and by default, is a legal requirement:

2.) Data is secured, and integrity and confidentiality are maintained, using technical and organizational means under the management of the controller:

3.) Data encryption shall be used, when possible:

4.) Data pseudonymization shall be used, when possible:

5.) Data shall be anonymized, when possible:

6.) Processing attributes and (the processing) steps shall be provided to the data subject in an easy to understand form at the time of data collection, electronically or in writing:

7.) Data subjects shall have the right to access and review the processing of their data at any time:

8.) Disparate data elements that could be considered personal data or considred personal profiling if processed or combined separately or together resulting in illegal activities:

9.) Data regarding a data subject shall be portable to another provider (or perhaps even your competitor):

10.) The data subject shall have a right to a copy of their data in a commonly used format:

11.) The data subject shall have the right to have their data updated, free of charge, if there is an error:

12.) The data subject shall have the right to have their data erased without undue delay:

13.) The data controller must notify other IT organiazations that hold the data subject’s data that the data subject has requested data erasure:

14.) The data subject shall have the right to object to processing, withdraw consent to processing and opt-out of processing. And the data subject can object to or withdraw their consent is these processing matters electronically:

15.) Data is stored only for the time necessary to meet the objectives of the data subject. Out-of-date personal data shall not be stored. (Part of an Electronic Records Management strategy). And the data subject shall be notified of this time period or its calculation approach at the time of the data capture:

16.) A determination must be made, almost immediately, whether a data breach is likely to have been a “high risk to the rights and freedoms of the natural person” as such a technical environment must be in place to identify, track and assess such breaches:

Data protection

Data Security

Data encryption

Data pseudonymization

Data shall be anonymized

Processing attributes

Data subjects

Disparate data

Data portability

Copying data

Updating data

Erasing data

Object/Consent and opt-out of processing

Data storage

Data breach actions
Receive the latest version of this course into your inbox


See why people choose JBI

"At jbi even the sales team are technical so you are able to ask questions before the course"

Garima Aon

Call our Tech Team :  0800 028 6400  request info



PUBLIC COURSES (LONDON, UK)
 

19th Oct 2017 - 2 days £1500
Book

see all dates


X

Show Discount for this course



PRIVATE COURSES


  Bring a JBI course to your office
  and train a whole team onsite
  0800 028 6400
or request quote


  You can customise this course to
  suit your exact needs here
  0800 028 6400 or request quote


 

 

 

 

Get in touch
0800 028 6400




 

 

view all case studies

 

 

Our inspiring and up-to-date courses gain exceptional feedback

►"great tips to help reduce build times"
► "we got access to exclusive content"
► "intensive course meant less time off"

►"what an inspiring trainer !"
► "colleagues at 2 sites joined via web"
► "I passed my exam the next day"

Newsletter ! Get exclusive news about upcoming programs, technical insights & special offers