Cipt FSG Sept 2017 v1
Cipt FSG Sept 2017 v1
Cipt FSG Sept 2017 v1
Study Guide
The IAPP currently offers three certification programs: The Certified Information Privacy Professional
(CIPP), the Certified Information Privacy Manager (CIPM) and the Certified Information Privacy
Technologist (CIPT).
The CIPP is the “what” of privacy. Earning this designation demonstrates your mastery of a
principles-based framework in information privacy in a legal or practical specialization. Within the CIPP,
there are five concentrations:
• Asian privacy (CIPP/A)
• Canadian privacy (CIPP/G)
• European privacy (CIPP/E)
• U.S. government privacy (CIPP/G)
• U.S. private-sector privacy (CIPP/US)
The CIPM is the “how” of operations. Earning this designation shows you understand how to manage
privacy in an organization through process and technology.
The CIPT is the “how” of technology. Earning this designation shows you know how to manage and
build privacy requirements and controls into technology.
There are no concentrations within the CIPM or CIPT—they cross all jurisdictions and industries.
OR
2. You can become a member of the IAPP—with access to numerous benefits like discounts,
networking opportunities, members-only resources and more—for just $250 USD, which includes
your annual maintenance fee.
More information about IAPP membership, including levels, benefits and rates, is available on the IAPP
website at iapp.org/join.
The CIPT is the first and only global privacy certification designed for IT, security and
engineering professionals.
Privacy certification is an important effort that requires advance preparation. Deciding how you will
prepare for your exams is a personal choice that should include an assessment of your professional
background, scope of privacy knowledge and your preferred method of learning.
In general, the IAPP recommends that you plan for a minimum of 30 hours of study time in advance of
your exam date; however, you might need more or fewer hours depending on your personal choices
and professional experience.
Exam Blueprint
The blueprint indicates the minimum and maximum number of items that are included on the CIPT
exam from the major areas of the body of knowledge. Questions may be asked from any of the topics
listed under each area.You can use this blueprint to guide your preparation.
Min Max
I. Understanding the Need for Privacy in the IT Environment 8 14
A. Evolving Compliance Requirements 1 3
GDPR considerations
A. Collection 4 6
Notice, choice/consent, collection limitations, secure transfer,
collection from third parties
B. Use 3 5
Compliance with regulation, data minimization, secondary uses, user
authentication, using PII in testing
C. Disclosure 3 5
According to notice, anonymize, minimize, define limitations, vendor
management programs
D. Retention 4 8
Working with records management, regulatory limitations, providing
data subject access, secure storage and archiving
E. Destruction 2 3
Digital, portable media, hard copy, identifying appropriate time
IV. Privacy in Systems and Applications 13 24
E. Data Encryption 3 5
Regulations and standards, file and disk encryption, application or
field encryption
G. Customer-Facing Applications 2 3
Software-based notice and consent, agreements
V. Privacy Techniques 5 13
A. Authentication Techniques 2 5
User name and password, single and multi-factor authentication
B. Identifiability 2 5
Labels that point to individuals, weak and strong identifiers,
pseudonymous and anonymous data, degrees of identifiability
C. Privacy by Design 1 3
Overview of Principles
B. Social Media 2 3
Personal information shared and collected
C. Online Threats 2 3
Phishing, SQL injection, cross-site scripting
D. Online Advertising 1 3
E. Tracking Technologies 2 3
Cookies, beacons, responsible practices
A. Cloud Computing 2 5
Types of clouds, privacy and security concerns
B. Wireless IDs 2 3
Bluetooth, Wi-Fi, cell phones and tablets
C. Location-based Services 2 3
Overview of principles
D. Smart Technologies 1 3
Data analytics, deep learning, Internet of Things (IOT), vehicular
automation
E. Video/Data/Audio Surveillance 1 2
F. Biometrics 1 2
2. Where should procedures for resolving complaints about privacy protection be found?
A. In written policies regarding privacy.
B. In the Emergency Response Plan.
C. In memoranda from the CEO.
D. In the minutes of corporate or organizational board meetings.
Sample Scenario
Country Fresh Sundries started in the kitchen of its founder Margaret Holmes as she made soap
following a traditional family recipe. It is a much different business today, having grown first through
product placement in health and beauty retail outlets, then through a thriving catalog business. The
company was slow to launch an online store, but once it did so, the online business grew rapidly. Online
sales now account for 65% of a business which is increasingly international in scope. In fact, Country
Fresh is now a leading seller of luxury soaps in Europe and South America, as well as continuing its
strong record of growth in the United States. Despite its rapid ascent, Country Fresh prides itself on
maintaining its homey atmosphere, as symbolized by its company headquarters with a farmhouse in front
of a factory in a rural region of Maine, in the U.S. The company is notably “employee friendly,” allowing,
for instance, employees to use their personal computers for conducting business and encouraging people
to work at home to spend more time with their families.
As the incoming Director of Privacy, you are the company’s first dedicated privacy professional. During
the interview process, you found that while the people you talked to, including Shelly Holmes, CEO,
daughter of the founder, and Jim Greene,Vice President for Operations, meant well, they did not possess
a sophisticated knowledge of privacy practices and regulations, and were unsure of exactly where the
company stood in relation to compliance and security. Jim candidly admitted, “We know there’s a lot we
need to be thinking about and doing regarding privacy, but none of us know much about it. We’ve put
some safeguards in place, but we’re not even sure they are effective. We need someone to build a privacy
program from the ground up.”
You have accepted the job offer and are about to report to work on Monday.You are now on a plane
headed toward your new office, considering your course of action in this position and jotting down some
notes.
1. How can you discover where personal data resides at the company?
A. Focus solely on emerging technologies as they present the greatest risks.
B. Check all public interfaces for breaches of personal data.
C. Conduct a data inventory and map data flows.
D. Interview each department head.
2. In analyzing the company’s existing privacy program, you find procedures that are informal and
incomplete. What stage does this represent in the AICPA/CICA Privacy Maturity Model?
A. Early.
B. Ad hoc.
C. Non-repeatable.
D. Pre-program.
The IAPP also offers testing at our major annual conferences. Event-based testing is paper-pencil format.
You can find detailed information about how to register for exams, as well as exam-day instructions in
the IAPP Certification Information Candidate Handbook, on our website at iapp.org/certify.
Questions?
The IAPP recognizes that privacy certification is an important professional development effort requiring
commitment and preparation. We thank you for choosing to pursue certification, and we welcome your
questions and comments regarding our certification program.
2. Where should procedures for resolving complaints about privacy protection be found?
A. In written policies regarding privacy.
B. In the Emergency Response Plan.
C. In memoranda from the CEO.
D. In the minutes of corporate or organizational board meetings.
Sample Scenario
Country Fresh Sundries started in the kitchen of its founder Margaret Holmes as she made soap
following a traditional family recipe. It is a much different business today, having grown first through
product placement in health and beauty retail outlets, then through a thriving catalog business. The
company was slow to launch an online store, but once it did so, the online business grew rapidly. Online
sales now account for 65% of a business which is increasingly international in scope. In fact, Country
Fresh is now a leading seller of luxury soaps in Europe and South America, as well as continuing its
strong record of growth in the United States. Despite its rapid ascent, Country Fresh prides itself on
maintaining its homey atmosphere, as symbolized by its company headquarters with a farmhouse in front
of a factory in a rural region of Maine, in the U.S. The company is notably “employee friendly,” allowing,
for instance, employees to use their personal computers for conducting business and encouraging people
to work at home to spend more time with their families.
As the incoming Director of Privacy, you are the company’s first dedicated privacy professional. During
the interview process, you found that while the people you talked to, including Shelly Holmes, CEO,
daughter of the founder, and Jim Greene,Vice President for Operations, meant well, they did not possess
a sophisticated knowledge of privacy practices and regulations, and were unsure of exactly where the
company stood in relation to compliance and security. Jim candidly admitted, “We know there’s a lot we
need to be thinking about and doing regarding privacy, but none of us know much about it. We’ve put
some safeguards in place, but we’re not even sure they are effective. We need someone to build a privacy
program from the ground up.”
You have accepted the job offer and are about to report to work on Monday.You are now on a plane
headed toward your new office, considering your course of action in this position and jotting down some
notes.
1. How can you discover where personal data resides at the company?
A. Focus solely on emerging technologies as they present the greatest risks.
B. Check all public interfaces for breaches of personal data.
C. Conduct a data inventory and map data flows.
D. Interview each department head.
2. In analyzing the company’s existing privacy program, you find procedures that are informal and
incomplete. What stage does this represent in the AICPA/CICA Privacy Maturity Model?
A. Early.
B. Ad hoc.
C. Non-repeatable.
D. Pre-program.