Il manager privacy è un profilo professionale relativo al trattamento e alla protezione dei dati personali, è responsabile per le attività di trattamento e coordina i soggetti coinvolti nel trattamento, al fine di garantire il rispetto delle norme applicabili, il raggiungimento e il mantenimento del livello di protezione adeguato in base allo specifico trattamento di dati personali.
The proposed training course consists of:

A 5-day basic module (40 hours) which constitutes a starting point for eventually embarking on the competence certification route
20 ore of training you can choose from the ITER courses below based on your professional needs
This will allow you to complete the 60 hours of professional training required by the certification scheme SK33-rve01 in accordance with UNI 11697

Privacy and GDPR: analysing and mapping business processes
Analysing and mapping business processes can help to reconsider the entire organisation from the point of view of both efficiency and security. It is therefore crucial to analyse who we are, what we do, why we do it, etc.

Audit and GDPR - UNI EN ISO 19011 Guidelines
The organisation must plan appropriate internal inspections (audits) with the aim of ascertaining the state of compliance of the Privacy System with the Regulation by preventing the occurrence of any anomalies, discrepancies and criticalities in the system and...

DPIA - Data Protection Impact Assessment
Conducting a proper DPIA allows data controllers to be able to identify the most appropriate measures to reduce and minimise risks in terms of impact on data subjects and to take any necessary technical, legal and organisational measures...

Total Security 4.0
How to carry out a risk analysis for the purpose of protecting: company assets, the rights and freedoms of natural persons under the GDPR, know-how. The description of the main security measures and their implementation...

Cybersecurity & Data Security
In an increasingly interconnected market, it becomes essential to rethink business and production processes in a completely different way, taking into account that the opportunities of digital and the internet are accompanied by threats and vulnerabilities...

Video surveillance in organisations
Analysis from a legal and IT-technical point of view to understand how the guidelines of the European Committee of Supervisors impact on companies and PAs installing surveillance systems...

Data breach in the GDPR
A personal data breach can, if not addressed in an appropriate and timely manner, cause physical, tangible or intangible harm to individuals. With this in mind, the GDPR highlights the procedures to be adopted with regard to the security of processing...

Privacy legislation in Italy after Legislative Decree 101/2018
The privacy rule in Italy with the introduction of Legislative Decree 101/2018 implementing the European Privacy Regulation GDPR 2016/679. How the "old" Privacy Code DLGS 196/03 changes with the "new" EU regulation GDPR...

GDPR applied to healthcare and scientific research
An overview of the GDPR principles regarding the processing of personal data in healthcare and scientific research: the main critical issues faced by healthcare professionals, both public and private sector, in managing the privacy system...

Worker privacy management: beyond the COVID emergency
The COVID emergency has forced workers and companies into a mode of working at home that does not always exactly coincide with the rules of a structured and planned smartworking ...

System Administrator Specialist: 16h
The responsibility of being a system administrator not only enables indiscriminate access to all aspects of information systems, including data and personal information managed by the organisation to which one belongs, but also implies...

Cybersecurity Specialist: 16h
In an increasingly interconnected market, it becomes essential to rethink business and production processes in a completely different way, taking into account that the opportunities of digital and the internet are accompanied by threats and vulnerabilities...

Web and App Specialist: 16h
Protezione contro attacchi comuni (SQL injection, XSS, CSRF), implementazione di misure di sicurezza robuste, gestione di autenticazione e autorizzazione sicure, testing di sicurezza, e l’analisi delle vulnerabilità…

Marketing Specialist: 16h
Understand the mechanisms leading to the generation of new business contacts, the correct evaluation of tools and the implications of data processing (profiling) and retention...