Difference between revisions of "Data Privacy Training"

From NHA Knowledge Portal
Jump to navigation Jump to search
Line 18: Line 18:
 
# Data Breach
 
# Data Breach
 
# Information Security
 
# Information Security
<div id="turnkey-credit"> <div style="clear: both;"> [https://www.turnkeylinux.org/mediawiki MediaWiki Appliance] - Powered by [https://www.turnkeylinux.org TurnKey Linux] </div> </div><div id="turnkey-credit"> <div style="clear: both;"> [https://www.turnkeylinux.org/mediawiki MediaWiki Appliance] - Powered by [https://www.turnkeylinux.org TurnKey Linux] </div> </div>
+
<div id="turnkey-credit"><div style="clear: both;"> [https://www.turnkeylinux.org/mediawiki MediaWiki Appliance] - Powered by [https://www.turnkeylinux.org TurnKey Linux] </div> </div><div id="turnkey-credit"><div style="clear: both;"> [https://www.turnkeylinux.org/mediawiki MediaWiki Appliance] - Powered by [https://www.turnkeylinux.org TurnKey Linux] </div> </div><div id="turnkey-credit"> <div style="clear: both;"> [https://www.turnkeylinux.org/mediawiki MediaWiki Appliance] - Powered by [https://www.turnkeylinux.org TurnKey Linux] </div>àẠʈ¿άἂӐتٴגআ௨ఃඇंંฃຂគᐃÀẚt¡αἀАاٲאঀ௦ంඅऀૐกកᐁ
 +
</div>

Revision as of 03:35, 7 August 2024

Course Objectives

At the end of this course, you should be able to discuss:

  • Data Privacy Act, its Implementing Rules, and relevant issuances of the National Privacy
  • Commission (NPC);
  • the role of the Data Protection Officers and their expected duties;
  • how to develop a Privacy Management Program for your organization;
  • how to handle security or data breach incidents within your organization; and
  • the basics of Information Security

Modules

  1. Basic Privacy Concepts
  2. Data Privacy Acts (Basic Concepts)
  3. Other Lawful Bases for Processing, Rights and Obligations of a Data Subject
  4. Enforcement
  5. Privacy Management Program
  6. Data Breach
  7. Information Security
àẠʈ¿άἂӐتٴגআ௨ఃඇंંฃຂគᐃÀẚt¡αἀАاٲאঀ௦ంඅऀૐกកᐁ