Exceptional training for APP & InfO securitY

GDPR for IT & Software Professionals Training Course

What will the GDPR mean for your organisation's Software Development Lifecycle? Start on the journey to compliance and Learn the tools and technologies available to help?

3 Oct London
request info

Capita Marks and Spencer Telefonica Cisco BBC Lloyds Sony

GDPR for IT & Software Professionals training course (code: GDPRDEV)


Our GDPR training course is aimed at IT and Software Professionals, who need to understand the impact of new EU legistlation and how to navigate the software development life cycle under the GDPR

Developed in response to the biggest shake up in European data protection and privacy for over two decades, this course prepares you to take the necessary steps to protect business continuity and strengthen organisational reputation in the UK and beyond.

The GDPR (General Data Protection Regulation) requires substantial work to assess the risks and implement new controls before it enters into law. This course will equip individuals and organisations with a solid knowledge of the practical implications of the GDPR which could ultimately avoid heavy fines and reputational damage.

Keep the course general or tailor it to your organisation, starting with a 1 day overview with follow-on sessions in which different business functions can realise the impact of GDPR more specifically.

Sit an optional exam and gain appropriate certification


IT and Software Professionals  who need to understand and learn how to tackle the implications of GDPR on their organisation.



Our course will address the following inventory of 16 areas of pertinent GDPR Recitals and Articles that influence the SDLC’s Functional and Technical Planning and Requirements for IT departments. This list will be helpful to general counsels, CIOs and leaders of IT as they compile their system’s requirements for their EU groups:

1.) Implementing data protection in the system and the organization, by design and by default, is a legal requirement:

2.) Data is secured, and integrity and confidentiality are maintained, using technical and organizational means under the management of the controller:

3.) Data encryption shall be used, when possible:

4.) Data pseudonymization shall be used, when possible:

5.) Data shall be anonymized, when possible:

6.) Processing attributes and (the processing) steps shall be provided to the data subject in an easy to understand form at the time of data collection, electronically or in writing:

7.) Data subjects shall have the right to access and review the processing of their data at any time:

8.) Disparate data elements that could be considered personal data or considred personal profiling if processed or combined separately or together resulting in illegal activities:

9.) Data regarding a data subject shall be portable to another provider (or perhaps even your competitor):

10.) The data subject shall have a right to a copy of their data in a commonly used format:

11.) The data subject shall have the right to have their data updated, free of charge, if there is an error:

12.) The data subject shall have the right to have their data erased without undue delay:

13.) The data controller must notify other IT organiazations that hold the data subject’s data that the data subject has requested data erasure:

14.) The data subject shall have the right to object to processing, withdraw consent to processing and opt-out of processing. And the data subject can object to or withdraw their consent is these processing matters electronically:

15.) Data is stored only for the time necessary to meet the objectives of the data subject. Out-of-date personal data shall not be stored. (Part of an Electronic Records Management strategy). And the data subject shall be notified of this time period or its calculation approach at the time of the data capture:

16.) A determination must be made, almost immediately, whether a data breach is likely to have been a “high risk to the rights and freedoms of the natural person” as such a technical environment must be in place to identify, track and assess such breaches:

Data protection

Data Security

Data encryption

Data pseudonymization

Data shall be anonymized

Processing attributes

Data subjects

Disparate data

Data portability

Copying data

Updating data

Erasing data

Object/Consent and opt-out of processing

Data storage

Data breach actions

Receive the latest version of this course into your inbox


3rd Oct 2019 - 2 days £1500

see all dates


Show Discount for this course


  Bring a JBI course to your office
  and train a whole team onsite
  0800 028 6400
or request quote

  You can customise this course to
  suit your exact needs here
  0800 028 6400 or request quote

0800 028 6400

Why JBI ?

►"great technology tips"
► "Access to exclusive content"
► "Short course means less time off"

►"Inspiring trainers"
► "Joined via web"
► "Knowledgable sales staff"

Get exclusive news about upcoming programs, technical insights & special offers