Curriculum For This Course
Video tutorials list
-
Course Introduction: CIPP/US Masterclass
Video Name Time 1. Why should you take this CIPP/US course? 3:58 2. What is the CIPP/US certificate? 7:15 3. What is the IAPP? 1:57 4. Why pursue a career in privacy? 10:55 5. Why get CIPP/US certified? 4:07 6. What is privacy? 14:05 7. What do privacy professionals do? 8:55 -
Domain 1: Intriduction to the U.S. Privacy Environment
Video Name Time 1. Branches of the U.S. Government 4:50 2. The U.S. Constitution and Privacy 9:50 3. Sources of U.S. Law 9:08 4. Legal Definitions 5:07 5. Where do privacy protections come from? 9:27 6. The Fair Information Practices (FIPs) 9:26 7. Global Interpretations of the FIPs 7:22 8. How to Analyze a Law Part 1 7:10 9. How to Analyze a Law Part 2 4:06 10. What is a regulatory authority? 7:19 11. Types of Privacy Risk 7:09 12. What is a data inventory? 12:22 13. How to Build a Privacy Program 13:01 14. Drafting, Reviewing, and Updating Privacy Policies 13:25 15. Managing User Privacy Preferences Part 1 8:10 16. Managing User Privacy Preferences Part 2 8:33 17. Internet Terminology for Privacy Pros Part 1 8:58 18. Internet Terminology for Privacy Pros Part 2 16:18 19. Online Cookies 6:37 20. The CIA Triad 7:45 21. Types of Privacy Attacks 9:16 22. Safeguarding Privacy 8:58 23. Children's Privacy 5:50 24. Data Collection and Use 14:32 25. Online Advertising Part 1 11:27 26. Online Advertising Part 2 12:30 27. Other Online Tracking Mechanisms 6:53 28. Vendor Management 10:36 29. A History of EU-US Data Transfer Frameworks 8:26 30. What is the GDPR? 10:04 31. The 7 GDPR Principles 6:35 32. GDPR Data Subject Rights 10:18 33. GDPR Enforcement and Breach Response 7:56 -
Domain 2: Limits on Private-sector Collection and Use of Data
Video Name Time 1. What is the FTC? Part 1 8:49 2. What is the FTC? Part 2 7:56 3. The FTC's Approach to Privacy 13:40 4. FTC Enforcement Case Studies 9:08 5. Children's Online Privacy Protection Act (COPPA) 6:04 6. Moore and Asimov's Laws 5:51 7. What is Big Data? 14:19 8. The Internet of Things (IoT) 13:20 9. Medical Privacy 5:14 10. What is HIPAA? 11:02 11. The HIPAA Privacy Rule 10:18 12. HIPAA Privacy Rule and Reproductive Health 10:18 13. The HIPAA Security Rule 9:29 14. The Health Information Technology for Economic and Clinical Health (HITECH) Act 11:17 15. 42 CFR part 2 11:09 16. The Genetic Information Nondiscrimination Act (GINA) 5:47 17. The 21st Century Cures Act 3:20 18. The Fair Credit Reporting Act (FCRA) 14:41 19. FCRA Notice and Disclosure 7:19 20. Other FCRA Requirements 7:17 21. The Fair and Accurate Credit Transaction Act (FACTA) 11:31 22. The Gramm-Leach-Bliley Act (GLBA) 10:59 23. GLBA Privacy Notices and the Safeguards Rule 10:16 24. California and New York GLBA Expansions 11:15 25. The Dodd-Frank Wall Street Reform and Consumer Protection Act 5:31 26. The Family Educational Rights and Privacy Act (FERPA) 9:45 27. FERPA Student Rights and Disclosure 9:47 28. FERPA and Other Laws 6:03 29. Education Technology 4:03 30. Telemarketing Regulations 7:27 31. Telemarketing Sales Rule (TSR) Restrictions 13:36 32. The Do Not Call (DNC) Registry 9:34 33. The Junk Fax Prevention Act and CAN-SPAM 9:26 34. CAN-SPAM and Mobile Service Commercial Messages (MSCM) 4:46 35. Customer Proprietary Network Information (CPNI) 6:08 36. Cable Communications Policy Act & Video Privacy Protection Act 12:09 37. Digital Advertising 8:42 38. Data Ethics 18:46 39. The Driver's Privacy Protection Act (DPPA) 2:24 -
Domain 3: Government and Court Access to Private-section Information
Video Name Time 1. The Fourth Amendment 5:31 2. Beyond the Fourth Amendment 5:51 3. The Bank Secrecy Act (BSA) 10:27 4. BSA Expansion Laws 3:22 5. Five Important Wiretap Laws 6:33 6. Telephone, Oral, Electronic, and Video Surveillance 9:01 7. Communications Assistance for Law Enforcement Act (CALEA) 4:25 8. The Foreign Intelligence Surveillance Act (FISA) 10:18 9. National Security and Privacy 14:15 10. The Cybersecurity Information Sharing Act (CISA) 6:33 11. Civil Litigation and Public Access 12:00 12. Required, Permitted, and Prohibited Disclosures 13:46 13. The Privacy Protection Act (PPA) 4:22 14. Electronic Discovery 9:29 15. Transborder Data Flows 6:15 16. The CLOUD Act 6:29 -
Domain 4: Workplace Privacy
Video Name Time 1. Introduction to Workplace Privacy 6:26 2. Laws Protecting Employee Privacy 6:24 3. Agencies Protecting Employee Privacy 3:50 4. Human Resources and Privacy 3:59 5. Privacy and the Employment Lifecycle 5:40 6. Background Screening and Anti-discrimination 9:08 7. The Americans with Disabilities Act (ADA) and Medical Screening 5:49 8. FCRA Employment Screening Restrictions 10:43 9. Polygraphs and Drug Testing 8:43 10. Workplace Monitoring 11:06 11. Monitoring Technologies 11:07 12. Employee Misconduct Investigations 4:18 13. After Employment Best Practices 2:53 -
Domain 5: State Privcy Laws
Video Name Time 1. California Privacy Protection Agency (CPPA) 3:07 2. Safeguarding Social Security Numbers 3:15 3. Data Destruction 8:47 4. CIA Triad (Review) 5:19 5. California Information Security Law (AB 1950) 6:38 6. Other State Information Security Laws 8:59 7. Illinois' Biometric Information Privacy Act (BIPA) 9:36 8. California Consumer Privacy Act (CCPA) - Scope 5:41 9. California Consumer Privacy Act (CCPA) - Definitions 6:34 10. California Consumer Privacy Act (CCPA) - Consumer Rights 6:01 11. California Consumer Privacy Act (CCPA) - Data Breaches and Enforcement 4:29 12. Recent State Developments 14:42 13. Key Terms Part 1: Business 8:07 14. Key Terms Part 2: Consumer and Personal Information 6:40 15. Key Terms Part 3: Sale 3:50 16. State Laws and Consumer Rights 7:16 17. State Laws and Business Obligations 5:56 18. State Laws Enforcement and Penalties 5:38 19. California Age-Appropriate Design Code Act 1:18 20. Data Breach Incident Response Management 14:25 21. Office of Management and Budget (OMB) M-17-12 4:39 22. State Breach Notification Laws Part 1 7:35 23. State Breach Notification Laws Part 2 11:52
Add Comment