The Data Protection Officer (DPO) is the new figure introduced by Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016, whose function is to support the data controller, data subjects and data processors in processing data and managing risks in accordance with the principles and guidelines of the Regulation and other Union or Member State data protection provisions.
The proposed training course consists of:

40 hours of training you can choose from the ITER courses below based on your professional needs
This will allow you to complete the 80 hours of professional training required by the certification scheme SK33-rve01 in accordance with UNI 11697

Analysing and mapping business processes can help to reconsider the entire organisation from the point of view of both efficiency and security. It is therefore crucial to analyse who we are, what we do, why we do it, etc.

The organisation must plan appropriate internal inspections (audits) with the aim of ascertaining the state of compliance of the Privacy System with the Regulation by preventing the occurrence of any anomalies, discrepancies and criticalities in the system and...

Conducting a proper DPIA allows data controllers to be able to identify the most appropriate measures to reduce and minimise risks in terms of impact on data subjects and to take any necessary technical, legal and organisational measures...

How to carry out a risk analysis for the purpose of protecting: company assets, the rights and freedoms of natural persons under the GDPR, know-how. The description of the main security measures and their implementation...

In an increasingly interconnected market, it becomes essential to rethink business and production processes in a completely different way, taking into account that the opportunities of digital and the internet are accompanied by threats and vulnerabilities...

Analysis from a legal and IT-technical point of view to understand how the guidelines of the European Committee of Supervisors impact on companies and PAs installing surveillance systems...

A personal data breach can, if not addressed in an appropriate and timely manner, cause physical, tangible or intangible harm to individuals. With this in mind, the GDPR highlights the procedures to be adopted with regard to the security of processing...

The privacy rule in Italy with the introduction of Legislative Decree 101/2018 implementing the European Privacy Regulation GDPR 2016/679. How the "old" Privacy Code DLGS 196/03 changes with the "new" EU regulation GDPR...

An overview of the GDPR principles regarding the processing of personal data in healthcare and scientific research: the main critical issues faced by healthcare professionals, both public and private sector, in managing the privacy system...

Digital health in the wake of Covid has undergone enormous development (from apps to online reports to telemedicine) and poses multiple challenges both in terms of innovation (artificial intelligence, blockchain) and cybersecurity...

The COVID emergency has forced workers and companies into a mode of working at home that does not always exactly coincide with the rules of a structured and planned smartworking ...

The responsibility of being a system administrator not only enables indiscriminate access to all aspects of information systems, including data and personal information managed by the organisation to which one belongs, but also implies...

In an increasingly interconnected market, it becomes essential to rethink business and production processes in a completely different way, taking into account that the opportunities of digital and the internet are accompanied by threats and vulnerabilities...

Protection against common attacks (SQL injection, XSS, CSRF), implementation of robust security measures, management of secure authentication and authorisation, security testing, and vulnerability analysis...

Understand the mechanisms leading to the generation of new business contacts, the correct evaluation of tools and the implications of data processing (profiling) and retention...