By possessing the Certified Information Privacy Professional (CIPP) certification, practitioners put privacy laws and policy in action. With this certification, organizations are recognized as having the best in compliance and risk avoidance policies. Each professional that earns the CIPP designation has the insights and knowledge that are needed to be an intricate part of privacy protection. There are five areas of geographic focus from within the CIPP/G:
- Asia (CIPP/A)
- Canada (CIPP/C)
- Europe (CIPP/E)
- U.S. Government (CIPP/G)
- U.S. private-sector (CIPP/US)
In this article, you will learn all about the U.S. government (G) certification. This will be an added bonus when applying to be an approved vendor, supplier, or consultant for the government.
The International Association of Privacy Professionals (IAPP) created this program in 2004. Since then, it has been a catalyst for data privacy careers and organizations coming into full compliance.
Specifically, the CIPP/G identifies you as having a comprehensive understanding of all laws and policies related to both the public and private American sectors. As a practitioner or as an entire organization, this certification provides a competitive advantage in achieving a working partnership with the country’s government.
To pass the exam for this certification, you’ll need to be proficient on these topics:
- U.S. government privacy laws;
- Why the U.S. government agencies value privacy;
- U.S. government privacy practices;
- Managing and organizing privacy programs;
- The intricacies of privacy as associated with the Federal government’s intelligence community.
It also covers the government standard practices for auditing, records management, and agency reporting as it relates to the various privacy laws.
For a complete list of topics, consult the Body of Knowledge. The CIPP/G exam blueprint also provides further insight into the expectations of skill sets as it relates to the government’s privacy laws and practices.
First and foremost, (Read more...)
*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Beth Osborne. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/2vurNTmo5uE/