The Certified Information Privacy Professional/Europe (CIPP/E) certification is one of several certifications offered by the International Association of Privacy Professionals (IAPP), a not-for-profit organization dedicated to education about data privacy.
IAPP is one of the longest-running, privacy-dedicated organizations in the world. It hosts regular conferences on privacy issues and offers a variety of certifications with a privacy focus. The CIPP/E is a variant of the popular CIPP exam with a focus on European privacy.
The European Union has a track record of protecting its citizens’ privacy, and in May 2018 a new set of stricter data protection and privacy rules was enacted known as the General Data Protection Regulation (GDPR). The implementation of GDPR has led to a surge in the number of individuals pursuing a CIPP/E certification.
What is the CIPP/E certification?
The CIPP/E is a privacy certification that has been developed in collaboration with a number of high-profile law firms that specialize in privacy. CIPP/E certification is viewed as the global standard in privacy qualifications. The certification is focused on EU-wide and EU nation state privacy laws and regulations. It also focuses on the practical application of those regulations.
The CIPP/E exam has been accredited by the American National Standards Institute (ANSI) under the International Organization for Standardization (ISO) standard 17024:2012. This establishes the certification as being of a high enough quality to be recognized globally.
Holders of the CIPP/E certification are able to demonstrate their knowledge and expertise in the often complex and nuanced privacy regulations of the EU and in particular the GDPR. The certification also focuses on cross-jurisdiction of privacy, such as the US-EU data transfer regulation “Privacy Shield.” The CIPP/E certification is seen as a globally important certification, especially as the GDPR will affect companies across the world, not just in Europe.
*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Susan Morrow. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/0o7nvZi9TnA/