June 2021
Intermediate to advanced
384 pages
11h 56m
English
In this chapter, you will learn about
• Baselining a privacy program to gauge future progress
• Assessing service providers as a part of a third-party risk management program
• Performing physical assessments of work centers and processing centers
• Protecting physical records, devices, and media
• Dealing with mergers, acquisitions, and divestitures
• Incorporating privacy impact assessments into business processes
This chapter covers Certified Information Privacy Manager job practice III, “Privacy Operational Lifecycle: Assess.” The domain represents approximately 22 percent of the CIPM examination.
“Trust but verify” is a Russian proverb that is commonly used by privacy and cybersecurity ...