EXCEPTIONAL TRAINING COURSES FOR IT PROFESSIONALS
LONDON UK | ONSITE | ONLINE
Our GDPR training course is aimed at IT and Software Professionals, who need to understand the impact of new EU legistlation and how to navigate the software development life cycle under the GDPR
Developed in response to the biggest shake up in European data protection and privacy for over two decades, this course prepares you to take the necessary steps to protect business continuity and strengthen organisational reputation in the UK and beyond.
The GDPR (General Data Protection Regulation) requires substantial work to assess the risks and implement new controls before it enters into law. This course will equip individuals and organisations with a solid knowledge of the practical implications of the GDPR which could ultimately avoid heavy fines and reputational damage.
Keep the course general or tailor it to your organisation, starting with a 1 day overview with follow-on sessions in which different business functions can realise the impact of GDPR more specifically.
Sit an optional exam and gain appropriate certification
IT and Software Professionals who need to understand and learn how to tackle the implications of GDPR on their organisation.
Our course will address the following inventory of 16 areas of pertinent GDPR Recitals and Articles that influence the SDLC’s Functional and Technical Planning and Requirements for IT departments. This list will be helpful to general counsels, CIOs and leaders of IT as they compile their system’s requirements for their EU groups:
1.) Implementing data protection in the system and the organization, by design and by default, is a legal requirement:
2.) Data is secured, and integrity and confidentiality are maintained, using technical and organizational means under the management of the controller:3.) Data encryption shall be used, when possible:
4.) Data pseudonymization shall be used, when possible:
5.) Data shall be anonymized, when possible:
6.) Processing attributes and (the processing) steps shall be provided to the data subject in an easy to understand form at the time of data collection, electronically or in writing:
7.) Data subjects shall have the right to access and review the processing of their data at any time:
8.) Disparate data elements that could be considered personal data or considred personal profiling if processed or combined separately or together resulting in illegal activities:
9.) Data regarding a data subject shall be portable to another provider (or perhaps even your competitor):10.) The data subject shall have a right to a copy of their data in a commonly used format:
11.) The data subject shall have the right to have their data updated, free of charge, if there is an error:12.) The data subject shall have the right to have their data erased without undue delay:
13.) The data controller must notify other IT organiazations that hold the data subject’s data that the data subject has requested data erasure:
14.) The data subject shall have the right to object to processing, withdraw consent to processing and opt-out of processing. And the data subject can object to or withdraw their consent is these processing matters electronically:
15.) Data is stored only for the time necessary to meet the objectives of the data subject. Out-of-date personal data shall not be stored. (Part of an Electronic Records Management strategy). And the data subject shall be notified of this time period or its calculation approach at the time of the data capture:
16.) A determination must be made, almost immediately, whether a data breach is likely to have been a “high risk to the rights and freedoms of the natural person” as such a technical environment must be in place to identify, track and assess such breaches:
Data protectionData Security
Data encryptionData pseudonymization
Data shall be anonymized
Processing attributesData subjects
Disparate dataData portability
Copying dataUpdating data
Erasing dataObject/Consent and opt-out of processing
Data storageData breach actions
See why people choose JBI
Call our Tech Team : 0800 028 6400 request info
Bring a JBI course to your office
and train a whole team onsite
0800 028 6400 or request quote
Get in touch
0800 028 6400
The BBC, who have a very substantial investment in technology, were keen to improve the quality of software development: to instil developers...
A leading Financial Services organisation was keen to get several of its teams working consistently in an "Agile" way. Agile is an...
This client was expanding its capability to deliver technical training across EMEA. It had recently acquired a large technology company which...
Our inspiring and up-to-date courses gain exceptional feedback
"great tips to help reduce build times"
"we got access to exclusive content"
"intensive course meant less time off"
"what an inspiring trainer !"
"colleagues at 2 sites joined via web"
"I passed my exam the next day"
Traditionally Cyber security has been associated mainly with penetrating networks and infrastructure. Now a more subtle level of attack needs...
Back in March 2014, the Angular team dropped a bomb by announcing Angular 2 and everyone started yelling. Instead of an evolutionary step forward,...
MVC The Model View Controller (MVC) architectural pattern has a long history (together with its variants) and has been used in many languages...