Hero Image

PRIVACY ENGINEERING TRAINING

IAPP Certified Information
Privacy Technologist
 (CIPT)

A privacy-focused professional IT certificate from the IAPP that
addresses data protection requirements and controls in technology

Book Now

Course Features

Official IAPP CIPT textbooks

5-hour online sessions

Live, interactive Instructor-led training

Unlimited 1-2-1 coaching

Exam preparation

CIPT exam voucher

1st year IAPP membership

Course Overview

The Certified Information Privacy Technologist (CIPT) is an operational-level qualification for IT and data professionals who require comprehensive knowledge about how to incorporate appropriate privacy controls into information and communications technology. Developed by IAPP in 2014 and refreshed in 2020, the CIPT is the leading privacy-focused IT certification. 

The inherent advantages of the technology we use every day are often in direct conflict with people's expectations of privacy. While on the one hand, consumers actively entrust organisations with information about themselves, their demands for greater privacy, coupled with strong data protection laws such as the UK and EU General Data Protection Regulation (GDPR), mean that privacy has become a central issue for IT professionals.

As technology advances, so too does the need to collect, process, store, transfer and share increasingly higher amounts of personal information. Unfortunately, weak systems with poor data protection controls inevitably lead to data assets being at risk of a breach, which leaves organisations vulnerable to regulatory enforcement, fines and reputational damage.

Unlike most IT certifications, which only include minimal information about technical privacy controls, IAPP developed the CIPT programme to provide in-depth knowledge about emerging tools and privacy-enhancing technologies (PETs) within this rapidly expanding field.

Those attending the CIPT will explore the data lifecycle, privacy risk models and frameworks, the principles of Privacy by Design, along with the fundamentals of PETs and their role within the organisation. The CIPT also evaluates the threat landscape along with the privacy-focused strategies, techniques and technologies used to mitigate these risks. In obtaining the CIPT, award holders demonstrate a deeper understanding of the measures and techniques required to engineer appropriate privacy controls within complex technological environments and satisfy the requirements of regulations such as the GDPR.  

This IAPP-accredited CIPT course is delivered online, although onsite and online in-company options are also available. Delegates can gain a recognised IT qualification at home or from their desk by attending three consecutive 5-hour live online sessions across one week. This accredited IAPP course prepares participants for the 150-minute multiple-choice IAPP Exam.

Course Costs

Attend the IAPP Certified Information Privacy Professional Technologist (CIPT) training course:

£1,495.00 + VAT

  • 10% discount for subscribing to our PrivacyNewsfeed & Training Announcement Newsletters
  • Book a second IAPP course and save up to £650.00 + VAT - contact for more information.
  • In-company options available for teams of 6 or more

IAPP training package includes:

  • 3 x 5-hour live online sessions across 3 days, or
  • 2 days for a traditional classroom setting
  • Authorised IAPP instructors
  • IAPP CIPT examination voucher
  • 1-2-1 coaching and support
  • 1st-year IAPP professional membership

Course materials:

Intended Audience

The IAPP Certified International Privacy Technologist (CIPT) is suitable for those individuals with the following roles or responsibilities:

    • Privacy engineers 
    • Data Protection Officers (DPOs)
    • Chief Privacy Officers (CPO)
    • CIO, CTO & CISO
    • IT/IS directors, managers
    • Data scientists, architects
    • Software & systems engineers
    • Programmers
    • Test managers & QA engineers
    • Information security, IT security and IT professionals
    • Business continuity managers
    • Risk managers
    • Website developers & UX/UI designers
    • Game Developers

Learning Outcomes

By obtaining the IAPP CIPT, individuals will learn:

    • What consumers expect
    • Privacy concepts, strategies and techniques relating to IT
    • How to build privacy-by-design into every stage of the IT lifecycle
    • How to set up privacy-preserving data collection and transfer processes
    • How to establish privacy-related IT security practices, such as data minimisation, access controls and encryption
    • How to evaluate and use emerging technologies while maintaining data privacy
    • How to audit IT infrastructure
    • How to communicate technical privacy issues to non-IT colleagues and collaborate with them to develop solutions

Organisations that employ IT professionals who hold the CIPT are more able to implement the strategies, policies, processes, and techniques required to manage cybersecurity risks while enabling reasonable personal data use for business purposes.

IAPP CIPT Knowledge Maps

The IAPP have mapped the skills and competencies gained on the CIPT programme to the above roles and more:

Due to its singular focus on privacy technology, the CIPT is complementary to other recognised industry IT qualifications, including those offered by, (ISC2), ISACA, Microsoft, Cisco, CompTIA, GIAC, EC-Council, ITIL IT Service Management, Prince II, Project Management Institute.

IAPP CIPT Body of Knowledge

This accredited CIPT training course is delivered online over 3 consecutive morning sessions (or 2 full days when provided in-company). 

The IAPP ensures the CIPT Body of Knowledge (BoK) is always relevant and up to date through consultation with its global community of information privacy practitioners and lawyers.

The CIPT is certified by the ANSI National Accreditation Board (ANAB) under ISO17024: 2012.

The following is extracted from the CIPT BoK version 3.2.0: 

Module 1: 
Foundational Principles
General Understanding of Privacy Risk Models and Frameworks and their Roles in Laws and Guidance:
   â€¢ Fair Information Practice Principles (FIPPs) and OECD Principles
   â€¢ Privacy frameworks (e.g., NIST/NICE, ISO/IEC 27701 and BS100112 Privacy Information Management System (PIMS))
   â€¢ Nissenbaum’s Contextual Integrity
   â€¢ Calo’s Harms Dimensions
   â€¢ FAIR (Factor Analysis in Information Risk)
General Understanding of Privacy by Design Principles:
   â€¢ Full Life Cycle Protection
   â€¢ Embedded into Design
   â€¢ Full Functionality
   â€¢ Visibility and Transparency
   â€¢ Proactive not Reactive
   â€¢ Privacy by Default
   â€¢ Respect for Users
General Understanding of Privacy-related Technology Fundamentals:
   â€¢ Risk concepts (e.g., threats, vulnerability)
   â€¢ Data/security incidents vs. personal data/privacy breaches
   â€¢ Privacy and security practices within an organisation
   â€¢ Understanding how technology supports information governance in an organisation
   â€¢ External Data Protection and Privacy notices
   â€¢ Internal Data Protection and Privacy guidelines, policies and procedures
   â€¢ Third-party contracts and agreements
   â€¢ Data inventories, classification and records of processing
   â€¢ Enterprise architecture and data flows, including cross-border transfers
   â€¢ Data Protection and Privacy impact assessments (DPIA/PIAs)
   â€¢ Privacy-related Key Risk Indicators (KRIs) and Key Performance Indicators (KPIs)
General Understanding of the Data Life Cycle:
   â€¢ Collection
   â€¢ Use
   â€¢ Disclosure
   â€¢ Transfer
   â€¢ Retention
   â€¢ Destruction
Module 2: 
Privacy technologist’s role in the organisation
General responsibilities:
   â€¢ Understanding various roles within the privacy team (e.g., DPO, CPO, legal compliance, security
   â€¢ Implementing industry Privacy Standards and Frameworks
   â€¢ Translating legal and regulatory requirements into practical technical and/or operational solutions
   â€¢ Consulting on internal privacy notices and external privacy policies
   â€¢ Consulting on contractual and regulatory requirements
Technical Responsibilities:
   â€¢ Advising on technology elements of privacy and security practices
   â€¢ Advising on the privacy implications of new and emerging technologies
   â€¢ Implementing privacy and security technical measures
   â€¢ Implementing and developing privacy-enhancing technologies and tools
   â€¢ Advising on the effective selection and implementation during the acquisition of privacy-impacting products
   â€¢ Advising on privacy by design and data protection impact assessments in systems development
   â€¢ Handling individuals’ rights requests (e.g., access, deletion)
   â€¢ Supporting records of processing activities (RoPA), automation of inventory and data flow mapping
   â€¢ Reviewing security incidents/investigations and advising on breach notification
   â€¢ Performing and supporting IT privacy oversights and audits, including 3rd party assessment
   â€¢ Developing, compiling and reporting Key Risk Indicators (KRIs) and Key Performance Indicators (KPIs)
Part 3: 
Privacy Risks, Threats and Violations
Data Ethics:
   â€¢ Legal versus Ethical (e.g., when working with countries that lack privacy laws)
   â€¢ Moral issues (e.g., accessing personal information through illegal means and using it for personal advantage)
   â€¢ Societal issues (e.g., manipulating societal conversations and attitudes on controversial topics)
   â€¢ Bias/discrimination (e.g., incorporating personal preference into data decisions)
During Data Collection:
   â€¢ Asking individuals to reveal personal information
   â€¢ Tracking and surveillance (e.g., geo-tagging, geo-social patterns)
   â€¢ Lack of informed consent
   â€¢ Automatic collection
   â€¢ Inaccuracies
   â€¢ Extracting from publicly available sources
   â€¢ Jurisdictional implications (e.g., localisation, government access)
During Data Use:
   â€¢ Insecurity
   â€¢ Identification and re-identification
   â€¢ Aggregation
   â€¢ Secondary Use
   â€¢ Exclusion
   â€¢ Profiling
During Data Dissemination:
   â€¢ Disclosure
   â€¢ Distortion
   â€¢ Exposure
   â€¢ Breach of Confidentiality (personal data breaches)
   â€¢ Increased accessibility
   â€¢ Blackmail
   â€¢ Appropriation
Intrusion, Decisional Interference and Self-Representation:
   â€¢ Behavioral advertising
   â€¢ Cyberbullying
   â€¢ Social engineering
   â€¢ Blackmail
   â€¢ Dark patterns
Software Security:
   â€¢ Vulnerability management
   â€¢ Intrusion detection and prevention
   â€¢ Change management (e.g., patches, upgrades)
   â€¢ Open-source vs Closed-source
   â€¢ Possible violations by service providers   
Part 4: 
Privacy-Enhancing Strategies, Techniques and Technologies
Data-Oriented Strategies:
   â€¢ Separate
   â€¢ Minimise
   â€¢ Abstract
   â€¢ Hide
Process-Oriented Strategies:
   â€¢ Informing the Individual
   â€¢ User Control
   â€¢ Policy and Process Enforcement
   â€¢ Demonstrate Compliance
Techniques:
   â€¢ Aggregation
   â€¢ De-identification
   â€¢ Anonymisation
   â€¢ Pseudonymisation
   â€¢ Encryption
   â€¢ Identity and access management
   â€¢ Authentication
   â€¢ Technology implications of Privacy Regulations and Techniques needed for:
     - Processing/verification of Individual Rights Request (IRR)
     - Ability for record processing activities related to customer data
     - Notice and Consent; obligations management
     - Retention Requirements
     - Privacy Incident Reporting
Part 5: 
Privacy Engineering
The Privacy Engineering role in the organisation:
   â€¢ Effective Implementation
   â€¢ Technological Controls
   â€¢ Protecting Privacy during the Development Lifecycle
Privacy Engineering Objectives:
   â€¢ Predictability
   â€¢ Manageability
   â€¢ Disassociability
Privacy Design Patterns
   â€¢ Design patterns to emulate
   â€¢ Dark patterns to avoid
Privacy Risks in Software
   â€¢ Controls and countermeasures
Part 6: 
Privacy by Design Methodology

The Privacy by Design Process:
   â€¢ Goal Setting
   â€¢ Documenting Requirements
   â€¢ Understanding quality attributes
   â€¢ Identify information needs
   â€¢ Privacy risk assessment and analysis
   â€¢ High-level design
   â€¢ Low-level design and implementation
   â€¢ Impose controls
     - Architect
     - Secure
     - Supervise
     - Balance
   â€¢ Testing and validation
Privacy Interfaces and User Experience:
   â€¢ Design Effects on User Behaviour
   â€¢ UX Design and Usability of privacy-related functions
   â€¢ Privacy Notices, Setting and Consent Management
   â€¢ Usability Testing
Value Sensitive Design:
   â€¢ How Design Affects Users
   â€¢ Strategies for Skillful Practice
Ongoing Vigilance:
   â€¢ Privacy audits and IT control reviews
   â€¢ Code reviews
   â€¢ Code audits
   â€¢ Runtime behavior monitoring
   â€¢ Software evolution
   â€¢ Data cleansing in production and non-production environments
Part 7: 
Evolving or Emerging Technologies in Privacy
Robotics and the Internet of Things (IoT):
   â€¢ Mobile phones
   â€¢ Wearable devices
   â€¢ Edge Computing
   â€¢ Smart homes and cities (e.g., CCTV and tracking/surveillance)
   â€¢ Robots
   â€¢ Drones
Internet/eCommerce:
   â€¢ Adtech
   â€¢ Cookies and other web-tracking technologies
   â€¢ Alerts and notifications
   â€¢ Location tracking
   â€¢ Chatbots
   â€¢ Online/mobile payments
Biometrics:
   â€¢ Facial recognition
   â€¢ Speech recognition
   â€¢ Fingerprint ID
   â€¢ Behavioral profiling
Corporate IT Services:
   â€¢ Shared Data centers
   â€¢ Cloud-based infrastructure
   â€¢ Third-party vendor IT solutions
   â€¢ Remote working
   â€¢ Video calls and conferencing
Advanced Computing:
   â€¢ Data Management and Analytics
   â€¢ Artificial Intelligence
   â€¢ Quantum computing
   â€¢ Blockchain
   â€¢ Cryptocurrencies
   â€¢ Non-fungible tokens (NFTs)
   â€¢ Machine and Deep Learning
Social Networks:
   â€¢ Social media
   â€¢ Messaging and video calling
   â€¢ Virtual/Augmented reality


Exam Preparation Day

The topics covered in this CIPT exam preparation session include:

  • Exam technique
  • Timing
  • IAPP examination format
  • How to set up the exam space for online exams or what to expect if they are going to a test centre
  • How to read and answer IAPP exam questions properly
  • Group discussion covering any topics delegates want to revisit, along with any queries that have come up during revision.
  • Availability of the IAPP Practice exams paper and where to find it on the IAPP website and cost.

Following the examination prep day, the instructor will offer guidance for further study areas.

IAPP CIPT Examination

IAPP Certified Information Privacy Technologist Exam information

IAPP exams have gained a reputation for being difficult to pass. Both Freevacy and the IAPP strongly recommend careful preparation, even for experienced professionals.

The following information about the CIPT examination is an extract from documentation provided to delegates by the IAPP. For the full details please review the IAPP Privacy Certification Candidate Handbook 2023 and the CIPT Examination Blueprint.

Exam Information

IAPP certification programs are designed to differentiate between candidates who do and who do not possess the knowledge required to be considered minimally qualified privacy professionals. All questions are multiple choice with some relating to scenarios. Each question has only one correct answer. Each item (question) consists of a clearly written question (stem), a correct or best response (key) that should be apparent to minimally qualified candidates and three incorrect responses (distractors) that will be plausible to not-minimally qualified candidates. Note that it is each candidate’s responsibility to be prepared for exams by being familiar with all elements of the Bodies of Knowledge.

Candidates are advised to read each question carefully. The stem may be in the form of a question or an incomplete statement. An exam question may require the candidate to choose the most appropriate answer based on a qualifier, such as MOST likely or BEST.

Total number of questions90
Scored questions75
Exam duration2 hours 30 minutes
Passing score300 out of 500

Scoring

On all IAPP certification exams, each item has equal value and is scored as correct or incorrect. Unanswered items are considered incorrect, and there is no additional penalty for incorrect answers.

Special Accommodations

It is the policy of the IAPP to provide testing accommodations to candidates with qualifying disabilities to ensure each candidate a comparable opportunity for success on exams. We require 30 days notice in order to arrange special accommodations. Please do not schedule an exam until the IAPP approves your request. After exam purchase, submit your request and supporting documentation using the forms provided on the IAPP website.

Exam Languages

All IAPP examinations are administered in English.

Our clients