• Presencial
  • Training

Certified Information Privacy Technologist (CIPT)

Privacy in Technology training is the how-to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems.

The CIPT is the first and only certification of its kind worldwide. It was launched by the IAPP in 2014 to meet the growing need that only tech pros can fill—securing data privacy at all stages of IT product and service lifecycles.

The CIPT credential shows you’ve got the knowledge to build your organisation’s data protection structures from the ground up. With regulators worldwide calling for tech professionals to factor data protection into their products and services, the job market for privacy-trained IT pros has never been stronger. Whether you work in the public or private sector, data privacy skills are quickly becoming a must-have—and that’s a great opportunity for you.

The CIPT certification also holds accreditation under ISO 17024: 2012.

This training is a robust, interactive opportunity to learn about critical privacy concepts that are also integral to the CIPT exam. While not purely a “test prep” course, this training is appropriate for professionals who plan to certify, as well for those who want to deepen their privacy knowledge. Both the training and the exam are based on the same body of knowledge.

Also included:
  • Certification Exam
  • IAPP 1-year membership (further details on membership here)

Cursos relacionados


  • Data Protection Officers
  • IT Managers and Administrators
  • Records Managers
  • System Developers
  • IT Security specialist
  • Anyone who builds and develops IT systems


Atendees will learn:

  • Critical data protection concepts and practices that impact IT
  • Consumer data protection expectations and responsibility
  • How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market
  • How to establish data protection practices for data collection and transfer
  • How to preempt data protection issues in the Internet of Things
  • How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance
  • How to communicate data protection issues with partners such as management, development, marketing and legal.


This course has two programmatic modules, the first four areas focus on the fundamentals of data protection. The second module takes the fundamentals and puts it into practice.


  • Fundamentals of information privacy
  • Privacy in the IT environment
  • Core privacy concepts
  • Privacy considerations in the information life cycle
  • Privacy in systems and applications
  • Privacy techniques
  • Online privacy issues
  • Technologies with privacy considerations

Fundamentals of information privacy
Reviews the modern history of privacy, foundational privacy concepts, data protection roles and fair information practices; explores the impacts of privacy and data protection regulations on information management.

Privacy in the IT environment
Describes compliance requirements, IT risks, and stakeholder privacy expectations; differentiates between privacy and security.

Core privacy concepts
Explains foundational elements for embedding privacy in IT and provides an overview of common privacy principles; summarizes data protection by design and default.

Privacy considerations in the information life cycle
Explores privacy considerations throughout the stages of the information life cycle.

Privacy in systems and applications
Examines the risks inherent in the IT environment and options for addressing them, including: identity and access management; credit card information and processing; remote access, BYOD and telecommuting; data encryption; and other privacy-enhancing technologies in the enterprise environment.

Privacy techniques
Describes the strengths and weaknesses of authentication techniques as well as the use of identifiers; reviews and illustrates privacy by design.

Online privacy issues
Explores the unique challenges that come from online privacy issues, including specific laws and regulations, online threats, social media, e-commerce, tracking technologies, and web security protocols.

Technologies with privacy considerations
Describes specific privacy considerations associated with a variety of technologies including cloud computing, wireless IDs, location-based services, “smart” technologies, video/data/audio surveillance, and biometric recognition.

Certified Information Privacy Technologist (CIPT)



Como chegou até nós

Os seus dados pessoais são recolhidos em conformidade com o Regulamento Geral de Proteção de Dados (RGPD).

Consente que os seus dados sejam utilizados, nos termos da nossa Politica de Privacidade, para o contacto/envio de:

Ações de informação, de marketing de produtos e serviços, como campanhas e eventos?

Para mais informações, consulte a Política de Privacidade do Grupo Rumos.
pode retirar o seu consentimento a qualquer momento através do botão Cancelar subscrição ou Unsubscribe que estão presentes em cada comunicação enviada, bem como exercer os direitos descritos na politica de privacidade