Course Curriculum

  • 1

    Test Your Knowledge

    • Test Your Knowledge

  • 2

    READING MATERIALS

    • Handouts

    • Lecture Slides A

    • Lecture Slides B

  • 3

    Introduction and Overview

    • Module Overview

  • 4

    Limitations on Data Privacy Rights

    • Limitations on Data Privacy Rights

  • 5

    30 Ways to Protect Yourself Online

    • 30 Ways to Protect Yourself Online : Part One

    • 30 Ways to Protect Yourself Online : Part Two

    • 30 Ways to Protect Yourself Online : Part 3

  • 6

    SECTION REVIEW: Ways to Protect Yourself Online

    • SECTION REVIEW: Ways to Protect Yourself Online

  • 7

    Threats to Data Privacy

    • Internal Weaknesses

    • Malicious Attacks

    • Emerging Attack Platforms

  • 8

    Five Pillars: Commit to Comply / Know Your Risks

    • Implement Privacy and Data Protection Measures

  • 9

    Five Pillars: Be Accountable

    • Develop a Privacy Management Program and Privacy Manual

  • 10

    Five Pillars: Demonstrate Your Compliance

    • Implement Privacy and Data Protection Measures - 1

    • Implement Privacy and Data Protection Measures - 2

  • 11

    Five Pillars: Be Prepared for Breach

    • Assessment of Security Incident and Data Breach

    • Security Incident Management Policy

    • Security Incident Response Team and Annual Reports

    • Mandatory Notification

    • Data Breach Notification

    • Personal Data Controller

    • Subsequent Investigation

  • 12

    SECTION REVIEW: Five Pillars of Data Privacy Accountability and Compliance

    • SECTION REVIEW: Five Pillars of Data Privacy Accountability and Compliance

  • 13

    Conclusion

    • Conclusion

  • 14

    EXERCISES

    • Scenario 1

    • Questions for Scenario 1

    • Scenario 2

    • Questions for Scenario 2

    • Scenario 3

    • Questions for Scenario 3

    • Scenario 4

    • Questions for Scenario 4

  • 15

    CASE STUDY

    • CASE STUDY: Uber Technologies

    • Questions: Uber Technologies

  • 16

    KEYPOINTS

    • Conclusion

    • Keypoints

  • 17

    QUIZ

    • Quiz: Understanding Data Privacy Law - Lesson 2

Instructor

CPA, CIA, FRIAcc, EnP, REB, REA, MICB

Jeff-Mike Smith Sule

Jeff-Mike Smith Sule is a Fellow of the Royal Institute of Accountants based in Singapore, a Certified Internal Auditor under The Institute of Internal Auditors, a Certified Bookkeeper under The Institute of Certified Bookkeepers based in United Kingdom, and Technical Education and Skills Development Authority (TESDA), and an Accredited Accounting Teacher.  He has four active professional licenses under PRC, to wit, Certified Public Accountant, Real Estate Appraiser, Real Estate Broker, and Environmental Planner. Jeff graduated Magna Cum Laude from Polytechnic University of the Philippines – Manila with a bachelor degree in accountancy. He placed Top 7 in the 2010 CPA Licensure Examination and Top 2  in the 2014 Real Estate Appraiser Licensure Examination. Jeff is currently an internal audit manager at American Data Exchange Company. He also held various management positions in ÆON Credit Service (Philippines), Inc., a Japanese non-bank financing company, namely Internal Control Manager, Portfolio Manager, Control Manager and Internal Audit Manager. Jeff also previously did IT and financial audit at Ernst & Young - Sycip Gorres Velayo and Company (SGV). He was also a faculty member of various educational institutions which include Ateneo de Manila University, De La Salle University, Mapua Institute of Technology, Far Eastern University, Philippine Christian University, Polytechnic University of the Philippines, Manila Integrated Review Schools Corporation, Shield Professionals Review and Training Center, and ExcelCIA Knowledge Institute Inc. He was also an accreditor of the Association of Local Colleges and Universities – Commission on Accreditation (ALCU-COA).Jeff shares his knowledge and expertise as a PICPA lecturer and a national speaker on topics that involve external and internal audit, IT audit, real estate and environmental planning, accounting and taxation, bookkeeping, business process management and organizational transformation.

Expected from the course program: Appreciate the Data Privacy Act of 2012; various data privacy rights; limitations on data privacy rights; different ways to protect personal data in online transactions; a myriad of threats to data privacy; and the five pillars of data privacy accountability and compliance. 

LEARNING OUTCOMES

TOPICS TO BE DISCUSSED

SPECIFIC OBJECTIVES OF THE TOPICS OR SUBTOPICS

Learn the various ways to protect personal data privacy in online transactions

Ways to Protect Online Data Privacy

Obtain knowledge and apply best practices to protect data privacy in online dealings

Learn a myriad of threats that compromise personal data privacy

Threats to Data Privacy

Gain an understanding of how personal data privacy are exposed to different threats

  • Internal weaknesses
  • Malicious attacks

Emerging attack platforms

Reinforce facts and principles covered in the lesson

Slides/Reading Materials

Recapture an overview of and retain in memory the principles of personal data privacy

Master the facts and principles covered in the lesson

Short Quiz (Multiple Choice)

Gain mastery of the principles and applications covered in the module

Know the threats to data privacy and learn how to protect yourself online!