Course Outline

Legal Framework Overview

  • Law 8968 in detail
  • Regulatory requirements and interpretations
  • Impact on administrative responsibilities

Principles Applied to Data Processing

  • Accuracy and relevance
  • Purpose limitation and lawful basis
  • Managing data under strict compliance guidelines

Secure Information Handling Procedures

  • Collection protocols aligned with PL-TI-001
  • Controlled storage and access
  • Secure deletion and data lifecycle management

Risk Management and Advanced Security Measures

  • Two-factor authentication usage
  • End-to-end encryption practices
  • Techniques for reducing exposure and vulnerabilities

Roles and Responsibilities

  • The responsibilities of the Controller
  • The responsibilities of the Processor
  • Operational alignment with internal procedures

Security Incident Response

  • Detection and escalation steps
  • Reporting obligations
  • Containment and remediation processes

Applied Case Review

  • Realistic incident scenarios
  • Decision-making under legal requirements
  • Strengthening organizational readiness

Summary and Next Steps

Requirements

  • An understanding of data governance concepts
  • Experience with information management procedures
  • Familiarity with internal security policies

Audience

  • Data administrators
  • Technical staff responsible for secure information processing
  • Teams in charge of compliance and data lifecycle oversight
 3 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories