All Episodes

Displaying 21 - 40 of 75 in total

Episode 20 — Build procedures that make privacy policies executable by frontline teams

This episode explains how to turn privacy policies into procedures that frontline teams can execute, because CIPM expects you to understand the operational layer where...

Episode 21 — Operationalize privacy notices and transparency to match real data practices

This episode explains how to operationalize privacy notices and transparency so they accurately reflect what the organization actually does with data, because the CIPM...

Episode 22 — Identify collection points and capture purpose, legal basis, and data quality needs

This episode focuses on identifying data collection points and documenting purpose, lawful basis drivers, and data quality requirements, because CIPM questions often h...

Episode 23 — Design processes for complaints handling that meet expectations and timelines

This episode teaches how to design a complaints-handling process that is consistent, documented, and timely, because the CIPM exam expects you to treat complaints as a...

Episode 24 — Build data subject rights operations: intake, verification, triage, and fulfillment

This episode covers how to build an operational model for data subject rights that can scale under real volume, because CIPM questions frequently test whether you can ...

Episode 25 — Establish retention rules that align legal duties, risk, and business value

This episode explains how to establish retention rules that balance legal requirements, privacy risk, and legitimate business value, because CIPM expects you to manage...

Episode 26 — Execute defensible disposal and deletion processes across systems and vendors

This episode focuses on making disposal and deletion defensible across modern architectures, because CIPM questions often test whether you understand the difference be...

Episode 27 — Govern internal sharing and disclosure with clear controls and approvals

This episode explains how to govern internal sharing and disclosure so personal data moves only as needed and with appropriate safeguards, because CIPM expects you to ...

Episode 28 — Govern external sharing: processors, controllers, recipients, and onward transfers

This episode covers how to govern external sharing using clear role definitions and contractual controls, because CIPM questions regularly test whether you can classif...

Episode 29 — Define privacy roles across IT, HR, Legal, Security, and product teams

This episode explains how to define privacy roles across core functions so accountability is clear and work does not stall, because CIPM is fundamentally about program...

Episode 30 — Define breach response roles by function, with internal and external accountability

This episode focuses on defining breach response roles by function, because CIPM expects you to coordinate privacy, security, legal, communications, and business leade...

Episode 31 — Build privacy training and awareness programs across employees and contractors

This episode explains how to design and run privacy training and awareness that actually changes behavior, because the CIPM exam tests whether you understand training ...

Episode 32 — Define privacy metrics for oversight, governance, and operational decision-making

This episode focuses on building privacy metrics that leaders can use to govern and improve the program, because CIPM questions often ask which measurements best refle...

Episode 33 — Design dashboards and reporting that make privacy metrics actionable for leaders

This episode teaches how to turn privacy metrics into dashboards and reports that drive decisions, because the CIPM exam expects you to communicate program status in a...

Episode 34 — Plan for audits: scope, evidence, sampling, and corrective action workflows

This episode explains how to plan for privacy audits in a way that reduces disruption and improves outcomes, because CIPM questions frequently test audit readiness, ev...

Episode 35 — Monitor legal change across jurisdictions and translate it into program updates

This episode covers how to monitor legal and regulatory change and convert it into practical program updates, because CIPM expects you to manage privacy programs in a ...

Episode 36 — Document data holdings using inventories that support real operational decisions

This episode explains how to build and maintain a data inventory that supports real decisions, because the CIPM exam tests whether you understand inventories as founda...

Episode 37 — Map data flows to understand processing, sharing, storage, and transfer points

This episode teaches how to map data flows so you can see how personal data moves through collection, processing, storage, sharing, and transfer, because CIPM question...

Episode 38 — Record data elements, purpose, access, systems, and retention for accountability

This episode focuses on recording the specific data elements a program manages, why they are processed, who can access them, where they live, and how long they are ret...

Episode 39 — Measure policy compliance using tests, attestations, and control validation methods

This episode explains how to measure privacy policy compliance using methods that stand up to scrutiny, because CIPM questions often test whether you can verify contro...

Broadcast by