Expected from the course program: Appreciate the Data Privacy Act of 2012; various data privacy rights; limitations on data privacy rights; different ways to protect personal data in online transactions; a myriad of threats to data privacy; and the five pillars of data privacy accountability and compliance. 

LEARNING OUTCOMES

TOPICS TO BE DISCUSSED

SPECIFIC OBJECTIVES OF THE TOPICS OR SUBTOPICS

Learn the various ways to protect personal data privacy in online transactions

Ways to Protect Online Data Privacy

Obtain knowledge and apply best practices to protect data privacy in online dealings

Learn a myriad of threats that compromise personal data privacy

Threats to Data Privacy

Gain an understanding of how personal data privacy are exposed to different threats

  • Internal weaknesses
  • Malicious attacks

Emerging attack platforms

Reinforce facts and principles covered in the lesson

Slides/Reading Materials

Recapture an overview of and retain in memory the principles of personal data privacy

Master the facts and principles covered in the lesson

Short Quiz (Multiple Choice)

Gain mastery of the principles and applications covered in the module

Course Curriculum

  • 1

    Important Reminders Before You Start Your Training

    • Daily Training Limit, Time Zone and Other Reminders

  • 2

    Test Your Knowledge

    • Test Your Knowledge

  • 3

    READING MATERIALS

    • Handouts

    • Lecture Slides A

    • Lecture Slides B

  • 4

    Introduction and Overview

    • Module Overview

  • 5

    Limitations on Data Privacy Rights

    • Limitations on Data Privacy Rights

  • 6

    30 Ways to Protect Yourself Online

    • 30 Ways to Protect Yourself Online : Part One

    • 30 Ways to Protect Yourself Online : Part Two

    • 30 Ways to Protect Yourself Online : Part 3

  • 7

    SECTION REVIEW: Ways to Protect Yourself Online

    • SECTION REVIEW: Ways to Protect Yourself Online

  • 8

    Threats to Data Privacy

    • Internal Weaknesses

    • Malicious Attacks

    • Emerging Attack Platforms

  • 9

    Five Pillars: Commit to Comply / Know Your Risks

    • Implement Privacy and Data Protection Measures

  • 10

    Five Pillars: Be Accountable

    • Develop a Privacy Management Program and Privacy Manual

  • 11

    Five Pillars: Demonstrate Your Compliance

    • Implement Privacy and Data Protection Measures - 1

    • Implement Privacy and Data Protection Measures - 2

  • 12

    Five Pillars: Be Prepared for Breach

    • Assessment of Security Incident and Data Breach

    • Security Incident Management Policy

    • Security Incident Response Team and Annual Reports

    • Mandatory Notification

    • Data Breach Notification

    • Personal Data Controller

    • Subsequent Investigation

  • 13

    SECTION REVIEW: Five Pillars of Data Privacy Accountability and Compliance

    • SECTION REVIEW: Five Pillars of Data Privacy Accountability and Compliance

  • 14

    Conclusion

    • Conclusion

  • 15

    EXERCISES

    • Scenario 1

    • Questions for Scenario 1

    • Scenario 2

    • Questions for Scenario 2

    • Scenario 3

    • Questions for Scenario 3

    • Scenario 4

    • Questions for Scenario 4

  • 16

    CASE STUDY

    • CASE STUDY: Uber Technologies

    • Questions: Uber Technologies

  • 17

    KEYPOINTS

    • Conclusion

    • Keypoints

  • 18

    QUIZ

    • Quiz: Understanding Data Privacy Law - Lesson 2

  • 19

    Evaluation Form

    • Evaluation Form and Attendance Sheet (as required under PRC Resolution no. 1244 Series of 2020)

Know the threats to data privacy and learn how to protect yourself online!

You may also be interested in...