EU GDPR Practitioner Training

Home / Data Protection Training / EU GDPR Practitioner Training

In-depth Training on EU GDPR

What is the EU GDPR?

The European Union implemented a new level of data protection legislation in May 2018 called the General Data Protection Legislation (GDPR).  After the UK’s transition from the European Union, this legislation is called UK GDPR within UK but remains effectively aligned in nearly all areas with the EU version.

All organisations processing personal data of either UK or EU citizens have to comply with the GDPR.

Course Overview

The Certified EU GDPR Foundation and Practitioner Course aims to educate professionals about the details of the GDPR and how to implement and comply with its provisions.  The course covers both the Foundation and Practitioner levels and is undertaken over a 4 day period, either instructor led or classroom based options are available.

Note – this course has been updated to cover the UK GDPR variations.

What is the course curriculum?

The course consists of instructor led tuition either online or classroom based.

It consists of 24 modules that are covered over the 4 day training period with an exam at the end.

Compliance Framework

EU GDPR Practitioner Training

£2295.00 + VAT

Fee applies to a single user license. Discounts are available for multiple users.

Module 1: Introduction to the GDPR​

GDPR in a Nutshell​
Generate Customer Confidence​
Focus of GDPR​
What is Personal Information? ​
Who has PII? ​
Lawful Processing of Personal Data

Module 2: Binding Corporate Rules

Introduction
Scope​
UK ICO’s View of the Scope​
Processing GDPR Definition​
Who Processes PII? ​
What is Special Data? ​
Legal Framework​
Timeline​ and Derogations​
Some Key Areas for Derogation​
Data Breaches/Personal Data Breach​
Consequences of Failure​
Governance Framework​

Module 3: GDPR Terminology and Techniques

Key Roles​
Data Set​
Subject Access Request (SAR)​
Data Protection Impact Assessments (DPIA) ​
What Triggers a Data Protection Impact Assessment? ​
DPIA is Not Required
Processes to be Considered for a DPIA​
Responsibilities​
DPIA Decision Path​
DPIA Content​
How Do I Conduct a DPIA? ​
Signing Off the DPIA​
Mitigating Risks Identified by the DPIA​
Privacy by Design and Default​
External Transfers​
Profiling​
Pseudonymisation​
Principles, User Rights, and Obligations​
One Stop Shop​

Module 4: Structure of the Regulation

Parts of the GDPR​
Format of the Articles​
Articles​ of the legislation

Module 5: Principles and Rights​

Introduction
Legality Principle​
How the Permissions Work Together​?
Lawfulness of Processing Conditions​
Lawfulness for Special Categories of Data
Criminal Offence Data​
Consent
Transparency Principle​
Fairness Principle​
Rights of Data Subjects​
Purpose Limitation Principle​
Minimisation Principle​
Accuracy Principle​
Storage Limitation Principle​
Integrity and Confidentiality Principle​
Accountability Principle​

Module 6: Demonstrating Compliance

Demonstrating Compliance with the GDPR ​
Impact of Compliance Failure​
Administrative Fines​
What Influences the Size of an Administrative Fine?
Joint Controllers​
Processor Liability Under GDPR​
Demonstrating Compliance
Protecting PII is Only Half the Job
What must be Recorded? ​
Additional Ways of Demonstrating Compliance​
Demonstrating a Robust Process​
PIMS (Personal Information Management System) ​
Cyber Essentials​
ISO 27017 Code of Practice for Information Security Controls​
Risk Management​

Module 7: Incident Response and Data Breaches​

What is a Personal Data Breach? ​
Notification Obligations​
What Breaches Do I Need to Notify the Relevant Supervisory Authority About? ​
What Information Must Be Provided to the SA? ​
How do I Report a Breach to the SA? ​
Notifying Data Subjects​
What Should I do to Prepare for Breach Reporting? ​
Updating Policies and Procedures​
Breach Reporting and Responses ​
Ways to Minimise the Breach Impact​

Module 8: Understanding the Principle Roles

What does the GDPR Makes Businesses Responsible For?
Difference Between a Data Controller and a Data Processor
How the Roles Split?
Controllers and Processors
Main Obligations of Data Controllers
Demonstrate Compliance
Joint Controllers and EU Representative
Controller-Processor Contract
Maintain Records and Keeping Records for Small Businesses
Cooperation with Supervisory Authorities
Keeping PII Secure
Data Breach Transparency
Role of the Data Processor
Controller-Processor Contract
Main Obligations of the Processor
Perform Only the Data Processing Defined by the Data Controller
Update the Data Controller
Sub-Process or Appointment
Keep PII Confidential
Maintaining Records
Cooperate with Supervisory Authorities
Security
Appoint a DPO – If Necessary
Transferring Data Outside the EU

Module 9: Role of the DPO

Role of a Data Protection Officer
Involvement of the DPO
Main Responsibilities of the DPO
Working Environment for the DPO
Must We Have A DPO?
Public Body
What does Large Scale mean?
Systematic Monitoring
Who Can Perform the Role of DPO?
Skills Required
Monitoring Compliance
Training and Awareness
Data Protection Impact Assessments (DPIAs)
Risk-Based Approach
Business Support for the DPO
DPO Independence
DPO – Conflict of Interest

Module 10: UK Implementation

Key Differences Between the Data Protection Act and the GDPR
Highlights from the Data Protection Bill
Definition of Controller
Health, Social Work, Education, and Child Abuse
Age of Consent
Exemptions for Freedom of Expression
Research and Statistics
Archiving in the Public Interest

Module 11: Key Features

Specific Permission
Privacy by Design
Data Portability
Right to be Forgotten
Definitive Consent
Information in Clear Readable Language
Limits on the Use of Profiling
Everyone Follows the Same Law
Adopting Techniques

Module 12: Subject Access Requests and How to Deal with them?

Subject Access Requests (SAR)
Dealing with SAR
Recognise the Request
Understand the Time Limitations
Dealing with Fees and Excessive Requests
Identify, Search, and Gather the Requested Data
Learn about What Information to Withhold
Developing and Sending a Response

Module 13: Data Subject Rights
  • Must I Always Obey a Right?
  • Rights and Third Parties
  • Requests Made on Behalf of Other Data Subjects
  • Guidelines for Children’s Maturity
  • Responding to a Rights Request
  • What is a Month?
  • Rights Request Flow Chart
  • Right to be Informed
    • When Should Information Be Provided?
    • Best Practice Guidance
  • Right of Access
  • Right to Rectification
  • Right to Erasure
    • When can I Refuse to Comply with a Request for Erasure?
    • Erasing Children’s Data
  • Right to Restrict Processing
    • When Processing Should be Restricted?
    • Protecting PII
    • Other Issues about Restricting Processing
  • Right to Data Portability
  • Right to Object
    • Complying with the Right to Object
    • Rejecting the Right to Object
    • Processing for Direct Marketing Purposes
    • Processing for Research Purposes
  • Rights Related to Automated Decision Making and Profiling
    • When does the Right not apply?
Module 14: Subject Access Requests

Provenance
Overview: SARs
SAR is an Activity, Not a Title
How can a SAR be Submitted?
What Information Should the Response to a SAR Contain?
Additional Information
Replying to a SAR
Confirming a Data Subject’s Identity
Scope
Electronic Records
Non-Electronic Records
SARs Involving 3rd Party PII
Fees
Refusing a Subject Access Request
Access Requests from Employees
Credit Reference Agencies
Best Practice for SARs

Module 15: Lawful Processing

Lawful Processing: A Reminder
User Rights Change Depending on the Justification
Lawfulness of Processing Conditions
Lawfulness for Special Categories of Data
UK ICO Tool
Consent
Key Points About Consent
Affirmative Action and Explicit Consent
Introduction of Affirmative Action
What is Not Affirmative Action?
Examples of Affirmative Action from the ICO
Introduction of Explicit Consent
Explicit Statement
Obtaining Explicit Consent
ICOs View of a Poor Form of Explicit Consent
Obtaining Consent for Scientific Research Purposes
Getting Consent
What Should Go into the Consent Request?
Consent Granularity
Right to Withdraw Consent
Children
Consent Records
ICOs Examples of Record Keeping
Key Points When Establishing Consent
Legitimate Interests
Getting the Balance Right
Consent or Legitimate Interest?
What Lawful Basis Can be Used for Processing Marketing PII?

Module 16: Third Country Data

Cross Border Transfers
Transfer Mechanisms
Derogations
Adequacy
Adequate Ways to Safeguard Transfers of PII
Consent
One-Off or Infrequent Transfers
Who is Responsible?
Transferring PII Between EEA Members
Adequate Countries Outside of the EEA
Binding Corporate Rules (BCR)
What a BCR Must Cover?
Authorisation for BCRs
EU-US Privacy Shield
Privacy Shield Overview
Privacy Shield: Mechanics
Model Clauses
Public Authority Agreements

Module 17: Introduction to Protecting Personal Data

Need to Secure
What is Appropriate?
Protecting PII – 3 Key Areas
Coverage
Defensive Design
Single Point of Failure (SPOF)
Incident Response
Data Breach Reporting Requirements
Incident Response Team

Module 18: Data Protection Impact Assessments (DPIA)

Introduction
What Triggers a Data Protection Impact Assessment?
Cases Where DPIA is Not Required
Benefits of DPIA
Processes to be Considered for a DPIA
Responsibilities
DPIA Decision Path
DPIA Content
How Do I Conduct A DPIA?
Signing Off the DPIA
Mitigating Risks Identified by the DPIA

Module 19: Need Want Drop

Overview
Need-Want-Drop: Concept Diagram
Need-Want-Drop: Categorising Data
Need/Want/Drop Methodology

Module 20: Dealing with Third Parties and Data in the Cloud

What is Cloud Computing?
Myths of Cloud
Cloud Challenges
Controller-Processor Contract
Checklist
Data Controller – Summary

Module 21: Practical Implications: GDPR

Brexit and its Impact on the GDPR
Adequacy
What does this Mean in Practice?
EU and in the United Kingdom Representatives
Exemption Rule
One-Stop Shop

Lawful, Fair, and Transparent Processing
Limitation of Purpose, Data and Storage
Data Subject Rights
Consent
Personal Data Breaches
Privacy by Design
Data Protection Impact Assessment
Data Transfers
Data Protection Officer
Awareness and Training

Module 23: Privacy Principles in GDPR

Lawfulness, Fairness, and Transparency
Purpose Limitation
Data Minimisation
Accuracy
Storage Limitation
Integrity and Confidentiality

Module 24: Common Data Security Failures, Consequences, and Lessons to be Learnt
  • Common Data Security Failures
  • Consequences
    • Fines Relating to Data Breaches
    • Litigation from Customers Relating to Data Breaches
    • Directors, Officers, and Professional Advisors
    • Reputational Damage
  • Lesson Learned
    • Knowing When and How to Communicate with Affected Individuals is Not Easy
    • GDPR is Important, as are Other Legal Frameworks
Privacy by Design

What’s included?

Certified EU General Data Protection Regulation (EU GDPR) Foundation and Practitioner Examination

World-Class Training Sessions from Experienced Instructors

Certified EU General Data Protection Regulation (EU GDPR) Foundation and Practitioner Certificates

Digital Delegate Pack

Current Incentives

We are offering discounts of 10% for a second user of 15% for three users or more

Easy Enrolment

It’s very easy to enrol on one of our online or classroom based training courses.

Simply fill out the contact form and we will be in touch to find out your exact requirements e.g. number of licenses, desired date and preferred location (if classroom based).

Contact Us

EU GDPR Practitioner Training Contact Us
First
Last
Data Protection

Thank you for contacting us

We will respond shortly

Note – if you do not receive an email from us please check your spam folder as we normally respond within 2 hours.

Data Privacy Services
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.