Privacy & GDPR Compliance Course for Developers
Online, self-paced training to help technical staff such as developers and product owners better grasp the requirements of the GDPR. By TechGDPR, experts in GDPR compliance for technology companies.
GDPR training for software developers
In heavily compliance-oriented environments, training is key in both increasing awareness and documenting organisational efforts carried out to mitigate risks.
At TechGDPR, we bridge the gap between the regulatory landscape and tech development. We thought it only fair to share the knowledge with the wide development community. Our course was created to address the needs of product developers hoping to navigate through the lack of practical instructions that come with GDPR implementation. This course is available on a self-paced learning platform and requires on average 1.5 to 2.5 hours of your time.
It comprises 7 lessons to help you navigate what you need to know to release compliant digital products. Each lesson offers an introductory video, text, graphics, activities which you can do and redo as much as you like until you feel confident and comfortable enough to print your certificate of completion. The resource section offers plenty of reading material and hands-on guidance for anyone involved in product design, creation and release.
Why train your tech team on the GDPR?
- You’ll be able to document the compliance efforts made at implementing data protection principles and Privacy by Design (GDPR Art. 5 and 25).
- You’ll gain an edge on competitors who still believe compliance is negotiated with clients on a case-by-case basis.
- You’ll gain access to best practices, recommendations, examples and a plethora of resources that would require a great deal of expertise and take up valuable time to put together on your own.
Whatever handout we’ve provided is yours to keep. - You’ll be able to assume thought leadership within your organization and help both design and legal teams understand one another.
1,5-2,5 hours
average completion time
We don’t want you to rush. Once you are ready to activate your course voucher, you have 3 months to start and resume whenever you want.
Certificate
on completion
Concept-checking activities you can do and redo help you test your understanding in each lesson. Once you are done, just pdf-publish your certificate of completion.
Innovate despite
privacy requirements
Let others argue the GDPR stifles innovation while you focus on confidently building software that fulfils requirements.
We have multiple purchasing options:
> 10 licenses
For more than 10 licenses, customisations and integrations into your existing LMS, please contact us for costs, options and delivery schedule.
Your trainer, Alex Carroll
Alex Carroll is Consulting Manager at TechGDPR. He develops consulting products and the consulting team. Following 10 years as an adult trainer in multicultural settings, he began focusing on management frameworks in 2012. Alex holds an MA in knowledge management and e-learning development from the Liberal Arts University of Montpellier III, a BA in quality, security and environmental management from the Law University of Montpellier I, and is certified by TüV as Data Protection Officer (Datenschutzbeauftragter) and as ISO 9001 Quality Management Officer (Qualitätsbeauftragter). He is additionally IAPP-certifed FIP, CIPP/e and CIPM as well as PECB ISO27001 Lead implementer. His background in adult education, eLearning and quality management helps him construct multidisciplinary stakeholder-oriented privacy programs and compliance management systems with a keen focus on implementation and documentation. He enjoys writing, public speaking and moderating privacy discussions. He is a featured presenter on TechGDPR’s youtube channel.
Course lessons and objectives
1. DATA PROTECTION OVERVIEW
Understanding the objectives of data protection, its principles and its essential definitions. Understanding what constitutes data processing and how to implement the lawfulness & transparency principle.
2. LEGAL BASIS & CONSENT
Understanding legal bases and their impact on product design as a software developer. Understanding what constitutes valid consent and when (not) to use it.
3. DESIGN CONSIDERATIONS AROUND DATA SUBJECT RIGHTS (DSRS)
Introduction to GDPR DSRs, understanding the exercisability of rights and Privacy by Design in this context. Understanding what is need to handle DSRs and what needs to be communicated back to the data subject.
4. DATA CONTROLLERS AND PROCESSORS
Understanding how the distinctions between data controllers and data processors inform product design for a compliant release. Understanding the implications of implementing 3rd-party SDKs. Understanding the requirements when subcontracting software development work or supporting controllers in data protection audits.
5. RISKS AND MEASURES
Understanding the GDPR’s risk-based approach. Understanding how classifying data improves risk assessment and helps identify appropriate security and administrative measures. Understanding how a Data Protection Impact Assessment (DPIA) works and how to handle breaches and prepare for them.
6. DATA TRANSFERS
Understanding the risk and compliance issues with transferring data outside of the EU and sharing access with non-EU development teams. Considering technical supplementary safeguards as a complement to documented agreements.
7. EMERGING TECHNOLOGIES (course round-up)
Considering innovation-triggered privacy issues. Understanding why automated decision-making is regulated and what it entails as a developer. Considering the automation of DSRs support.
Frequently Asked Questions
This course is most suitable for technical and product roles within your organisation, for example: software developers and engineers, engineering managers, devops, software architects, team leads, product owners, security architects, software quality managers, Information Security Management System (ISMS) and risk managers, sales and marketing engineers and startup teams. Compliance officers interested in better understanding technology-induced risks will also find this course to be highly relevant.
It allows your company to document its awareness raising efforts and argue that staff have been trained on data protection. It helps design teams make better and faster decisions as to product functionalities and data flows. It improves communication between business, tech and legal departments that don’t share common KPIs or perspectives, leading to products that hold up to client scrutiny and contributes to operations processing data lawfully.
This is your call but it is designed to cater for most learning and development or HR teams that customarily program training and refreshers once a year. This course is updated ad hoc and at least once, yearly.
From the moment the activation voucher is purchased and communicated to you, you have 6 months to enroll in the course.
From the moment you enroll in the course, you have 3 months to complete it. You can print a certificate of completion provided you score 60% on the quizzes strewn throughout the course. You can only print one certificate per voucher. The following year, a new voucher is issued allowing you to complete the course anew and publish a new certificate of completion.
This course uses real-life examples. If you wish to improve the impact of the course on the learning and actionability of knowledge for your organisation, it can be tailored to suite your needs. Relevant content includes your history of security incidents, your processing activities and risks, your technology and third parties, highlights to your existing policies. Get in touch to discuss the scope of the updates, pricing and delivery.
If you are interested in more than 10 licenses, we will gladly organize a personal demo for you. Please reach out.