Program Objectives
- Deconstruct the Philippine Data Privacy Act (DPA): Guide participants through a comprehensive analysis of the DPA’s requirements and implications to provide them with the knowledge to ensure organizational compliance and mitigate legal risks.
- Engineer Effective Data Protection Strategies: Enable participants to operationalize data protection principles within their organizations by managing risks and incorporating privacy by design principles.
- Construct Robust Information Security Frameworks: Lead participants in developing and implementing comprehensive information security programs that safeguard sensitive data, prevent breaches, and align with industry best practices.
- Respond to Data Breaches with Confidence: Prepare participants with the knowledge and tools to create effective data breach response plans, ensuring swift and effective incident management to minimize damage and preserve stakeholder trust.
- Cultivate a Privacy-Centric Culture: Instill a data protection mindset throughout organizations that fosters ethical data practices and establishes a foundation for ongoing compliance with evolving privacy regulations.
What You Will Learn
- Philippine Data Privacy Act (DPA) Compliance
- Privacy Risk Assessment and Mitigation
- Protection Impact Assessments (PIA)
- Information Security Management
- Data Breach Response
- Personal Information Processor (PIP) Management
- Privacy by Design Implementation
- International Privacy Standards and Certifications
- Data Ethics and Governance
- Leadership and Advocacy in Data Protection
Full Day 1 | Full Day 2 | Full Day 3 | Full Day 4 | Full Day 5 |
Privacy and Data Protection
The Data Privacy Act of 2012 |
Information Lifecycle: Collection, Usage and Processing, Storage and Disposal, Disclosure and Transfer | Access Principle and the Rights of Data Subjects
Organizational Accountability |
Data Privacy Management – Govern, Asses, Manage, Enforce, and Respond | Privacy Applications & Systems
Data Protection by Design |
Full Day 6 | Full Day 7 | Full Day 8 | Full Day 9 | Full Day 10 |
Data Protection Impact Assessment / Privacy Impact Assessment
ISO Standards Philippine Privacy Trustmark |
Personal Information Processor & Governance
Personal Information Processor Risk Assessment / Due Diligence |
Policies and Contractual Protections
Managing and Monitoring Personal Information Processor Performance / Relationships |
Introduction to Information Security
Asset Management |
Information Security Risk Management
Security Operations |
Full Day 11 | Full Day 12 | Half Day 13 | ||
Information Security Incident Management
Crisis Management |
Data Breaches & Enforcement
Creating a Data Breach Response Plan |
Responding to Data Breaches |
Key Benefits
- Data Protection Expertise: Gain in-depth knowledge of the Philippine Data Privacy Act, international standards, and best practices in data protection to make informed decisions and lead the organization’s compliance efforts.
- Operational Excellence: Develop practical skills for implementing privacy by design, conducting risk assessments, managing vendors, and responding to data breaches to ensure the organization’s data practices are secure and efficient.
- Strategic Advantage: Elevate the organization’s brand reputation and build trust with internal stakeholders, customers, and partners by demonstrating a commitment to robust data protection practices and proactive risk management.
Who Should Attend
This program is ideal for Data Protection Officers, compliance officers, risk managers, information security officers, IT professionals, legal counsel, audit professionals, business leaders and executives, department heads, entrepreneurs, small business owners, and marketing professionals responsible for or interested in ensuring their organization’s compliance with data privacy regulations and best practices. Individuals establishing a new data protection program, enhancing existing practices, or seeking to advance their careers in this critical field will find immense value in the knowledge and skills provided by this comprehensive program.