Personal Information Processor Management

Program Days:

May 4, 11,  2024
8:30 AM to 5:00 PM (GMT+08) on all dates

PROGRAM FORMAT
Delivered online via live virtual interactive sessions in Zoom

PROGRAM FEE
PHP 25,990.00 or USD 473.00*

*The prevailing exchange rate at the date of payment may apply
Let us know if you are interested to avail of early bird/group discount or discuss payment terms.

Program Overview

Personal Information Processor (PIP) Management is the process whereby companies monitor, manages and govern its engagement with outsourced personal information processors or PIPs which may include other external party. This includes both contractual and non-contractual obligations that impact the privacy and protection of personal data. How should organizations engage the services of PIPs to ensure the protection of personal data? What is the right way of managing your solution providers, vendors, suppliers, and other stakeholders that processors personal information on behalf of the company? To what extent should you manage them, and how do you conduct proper due diligence to minimize the exposure of your organization to personal data processing risks?

Managing personal information processing providers have been a complex challenge for compliance, audit, and risk management in the digital world. For data protection and data governance professionals, it is a must to ensure that personal information processors (PIPs) support and complement the privacy and data protection compliance requirements of the organization.
You can delegate the task, but not the accountability when your PIPs suffer a personal data breach, it impacts your organization and your customers. A data breach can also trigger compliance liabilities for the organization, even if it is caused by PIPs.
This course will teach you the frameworks, techniques, and best practices for managing PIPs, in the aspect of information security and privacy. Learn how to choose the right vendors or personal information processors, how to conduct due diligence, how to craft policies which protect your organization, and how to continuously monitor whether PIPs are complying with processing obligations and requirements.

Program Objectives

The course aims to provide compliance and data protection professionals with the right knowledge and techniques when it comes to managing PIP vendors. Participants will go back to their organization with toolkits that enable them to better scrutinize, choose, and manage their PIP providers.

By joining the program, participants will gain the right mindset and confidence to enforce the right practices in PIP management, so that they can help minimize the risk and exposure of the organization.

What You Will Learn

Day 1: Personal Information Processor & Governance
Day 2: Personal Information Processor Risk Assessment / Due Diligence
Day 3: Policies and Contractual Protections
Day 4: Managing and Monitoring Personal Information Processor Performance
Day 5: Managing and Monitoring Personal Information Processor Performance/Relationships

 

Key Benefits

Well-structured Program and World-class Faculty

The online program offers a venue for high-impact learning with real-time, experiential, and interactive online sessions. Participants will learn from AIM’s world-class faculty and its network of industry leaders and practitioners.

Gain a Holistic Business Perspective and Deeper Understanding of Privacy and Data Protection

The program helps leaders, managers, supervisors, and individual contributors develop a broader business perspective and a deeper understanding of privacy and data protection linkages between key teams in an organization, such as Finance, Sales, Marketing, Customer Service, Human Resources, and Operations.

Enhanced Privacy and Data Protection Leadership and Personal Data Governance Skills

The program enhances the participants’ capability to lead and manage in a cross-functional setting, improving performance, planning, collaboration, and execution of cross-functional efforts while embedding privacy and data protection to business processes.

Who Should Attend
  • Data Protection Officers, Data Protection Professionals, Data Governance Officers, Information Security Officers who want to enhance their third-party management capabilities.
  • Compliance Officers, Risk Management Officers, and Audit Management Professionals will also understand how to better manage and audit their third-party suppliers and vendors.
  • Entrepreneurs and Business Owners who want to learn how to better govern their vendors and suppliers to reduce risk will also benefit from this program.