0% found this document useful (0 votes)
165 views2 pages

Privacy Manager Certification: Examination Blueprint For The Certified Information Privacy Manager (CIPM)

This document provides an examination blueprint for the Certified Information Privacy Manager (CIPM) certification. It outlines the major domains and topics that will be covered on the exam. For each domain, it indicates the minimum and maximum number of questions that will assess knowledge of the topics listed. While the number and distribution of questions may vary, the total number of questions for each domain will fall within the ranges provided. The blueprint is intended to guide exam preparation by helping candidates understand which domains and topics will feature most prominently on the test.

Uploaded by

Matthew
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
165 views2 pages

Privacy Manager Certification: Examination Blueprint For The Certified Information Privacy Manager (CIPM)

This document provides an examination blueprint for the Certified Information Privacy Manager (CIPM) certification. It outlines the major domains and topics that will be covered on the exam. For each domain, it indicates the minimum and maximum number of questions that will assess knowledge of the topics listed. While the number and distribution of questions may vary, the total number of questions for each domain will fall within the ranges provided. The blueprint is intended to guide exam preparation by helping candidates understand which domains and topics will feature most prominently on the test.

Uploaded by

Matthew
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Controlled Document Approved by: IAPP Effective Date: 09/01/21

Page 1 of 2 Certification Advisory


Board

Version 2.0.1 Approved on: 12/2/20 Supersedes: 2.0.0

Privacy Manager Certification


Examination Blueprint for the
Certified Information Privacy Manager (CIPM)

What the blueprint tells you:


The examination blueprint indicates the range, or minimum and maximum number, of items
that are included on the CIPM examination from the major domains and topics of the Body
of Knowledge.

How to use the blueprint to guide your exam preparation:


Questions may be asked from any of the listed topics under each domain. Use the minimum
and maximum ranges to help you determine which domains and topics will be represented
to a lesser or greater degree on the exam.
Why don’t all the numbers add up?
The number of questions listed for each topic represents a range. Within a domain, a
minimum number of items may be chosen from one topic, while a maximum number of
items may be chosen from another topic. Regardless, the total number of questions within
each domain will not fall below the minimum or exceed the maximum amount.

I. Developing a Privacy Program 13 17


A. Create a company vision 1 3
B. Establish a Data Governance model 1 3
C. Establish a privacy program 3 5
D. Structure the privacy team 1 3
E. Communicate 4 6
II. Privacy Program Framework 9 11
A. Develop the Privacy Program Framework 3 5
B. Implement the Privacy Program Framework 2 4
C. Develop Appropriate Metrics 2 4
III. Privacy Operational Lifecycle: Assess 13 17
A. Document current baseline of your privacy program 1 3
B. Processors and third-party vendor assessment 3 5
C. Physical Assessments 1 3
D. Mergers, acquisitions, and divestitures 1 3

Pease International Tradeport ∙ 75 Rochester Avenue. Suite 4 ∙ Portsmouth, NH 03801 USA ∙


+ 1 603.427.9200 ∙ certification@privacyassociation.org
Controlled Document Approved by: IAPP Effective Date: 09/01/21
Page 2 of 2 Certification Advisory
Board

Version 2.0.1 Approved on: 12/2/20 Supersedes: 2.0.0

E. Privacy Impact Assessments and Data Protection Impact Assessments 4 6


IV. Privacy Operational Lifecycle: Protect 12 16
A. Information security practices 4 6
B. Privacy by Design 2 4
C. Integrate privacy requirements and representation into functional 2 4
areas across the organization
D. Other Organizational Measures 2 4
V. Privacy Operational Lifecycle: Sustain 5 7
A. Monitor 2 4
B. Audit 2 4
VI. Privacy Operational Lifecycle: Respond 9 11
A. Data-subject information requests and privacy rights 5 7
B. Privacy incident response 3 5

Pease International Tradeport ∙ 75 Rochester Avenue. Suite 4 ∙ Portsmouth, NH 03801 USA ∙


+ 1 603.427.9200 ∙ certification@privacyassociation.org

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy