cipm 2.0 - iapp

This class was created by Brainscape user Host Mom. Visit their profile to learn more about the creator.

Decks in this class (21)

Chapter 6 - Data Subjects Rights
0  cards
6.1 Privacy Notice and Policies
What data is collected,
How collected data is used,
How collected data is shared
10  cards
6.2 Choice, Consent and Opt-Outs
Under the _____ electronic consen...,
A pre ticked box is ____ _______ ...
2  cards
6.3 Obtaining Consents from Children
0  cards
CH 7 - Training & Awareness
What do training awareness progra...,
What is the difference between tr...,
What is training
7  cards
CH 8 Protecting Personal Information
0  cards
CH 8.1 Privacy by design
What is privacy by design,
Data minimization,
Data destruction
19  cards
8.2 Data Protection by Design and by Default
0  cards
CH 8.4 Information Security
What is confidentiality to inform...,
What is integrity to information ...,
What is availability to informati...
21  cards
CH 9: Data Breach Incident Plans
Confirmed disclosure of data to u...,
A situation in which the confiden...,
Average cost of data breach
46  cards
9.1 Incident Handling
What 2 things should employees be...,
What happens if a company breaks ...,
Once breach investigators conclud...
3  cards
9.5 Roles in Incident Response Planning, by Function
0  cards
CH 10 - Measure, Monitor & Audit Program Performance
What is the first step to select ...,
Who makes up the primary metric a...,
Who makes up the secondary metric...
18  cards
10.1 Metrics
Risks,
Metrics definition,
Necessary privacy metrics
6  cards
CIPM Protect
Data life cycle management,
Paul copple 11 element dlm model ...,
Is practices cia triad
12  cards
CIPM Respond
4 respond principles,
Requests 2 layers response,
Negligence elements when fail to ...
8  cards
10.2 Monitoring
0  cards
CIPM Assess
Privacy operational life cycle 4 ...,
Assessment maturity models defini...,
Assessment models
8  cards
CIPM Sustain
3 sustain elements,
Monitor,
Forms of monitoring
7  cards
Red Flags
Number of engineers,
Education of technical staff,
Contracts with ambiguous technology
18  cards
SOC Reports
What is the purpose of a soc report,
Soc 1,
An example subservice organizatio...
13  cards

More about
cipm 2.0 - iapp

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Host Mom's CIPM 2.0 - IAPP flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

IAPP Training CIPP/E CIPM
  • 12 decks
  • 128 flashcards
  • 6 learners
Decks: Cippe Module 1 European Data Protection, Cippe Module 2 Personal Data, Cippe Module 3 Controllers And Processor, And more!
Privacy IAPP
  • 1 decks
  • 30 flashcards
  • 1 learners
Decks: Privacy Key Terms, And more!
CIPM
  • 6 decks
  • 142 flashcards
  • 7 learners
Decks: Cipm Ch 1 Privacy Program, Cipm Ch 2 Privacy Program Framework, Cipm Ch 3 Assess, And more!
CIPM 3.0 - IAPP
  • 39 decks
  • 372 flashcards
  • 84 learners
Decks: Domain I Developing A Privacy Program, A Create A Company Vision, B Establish A Data Governance Model, And more!
Make Flashcards