Build GDPR Compliance
Are you interested in GDPR compliance? Are you a Cloud Service Provider (CSP) and do not know which are the requirements for you? Do you work with Cloud Service Providers and do not know how to treat these contracts under GDPR? Are you involved in IoT area and want to find out more about compliance under GDPR?Then this course is for you!And its not only theory – we do opt for templates and examples and we have prepared a list of 12 documents that you can start working with immediately.You may ask what exactly? Well,we have 3 procedures,the GDPR Assessment Procedure, Privacy Notice Procedure and GDPR Competence Development Procedure. Its all about training right? Well, as you are trained now, its important to understand the level of GDPR knowledge inside your company – this will help you understand which people are most relevant to speak to your collaborators, including cloud service providers. In this line, I have prepared also the GDPR Competence Development Questionaire. We do also have an important Data Subject Request Register and DPIA Assessment Questionaire that will help you identify when and if there is a need for a DPIA and what is the risk level for a specific request.
And in the end, we have created a total of 6 forms: Supplier GDPR Assessment Form, Privacy Notice Planning Form, Data Subject Request Form, Record of Processing Activities, Personal Data Flow Mapping Tool and Personal Data Mapping Diagram. All these will be really helpful either you are working with a CSP or you are a CSP being involved in processing activities.
Take a short look at the intro and the free preview lessons in order to get an idea about the real value of this course.
Take some time and enroll in our best selling academy with a lot of best selling courses.
Who is the target audience?
- Everybody interested in GDPR compliance
- Every Cloud Service Provider
- Everyone working with a Cloud Service Provider
- Everyone interested in data privacy
- Basic privacy concepts
- Basic compliance understanding
- Basic IT security
Created by: Roland Costea
Duration: 2h 9m