What is Certified EU General Data Protection Regulation (EU GDPR) Foundation and Practitioner Course?

The Certified EU GDPR Foundation and Practitioner Course is designed to provide a comprehensive understanding of the EU General Data Protection Regulation (GDPR) and its practical application. This course covers the principles, requirements, and implementation strategies of GDPR, ensuring organisations can protect personal data and achieve compliance.

Learners will gain hands-on experience interpreting GDPR requirements, conducting data protection impact assessments (DPIAs), and implementing appropriate technical and organisational measures to secure data. The training also prepares Learners to handle data breaches and interact effectively with supervisory authorities.

This intensive 1-day Certified EU GDPR Foundation and Practitioner Course by Oakwood International provides Learners with the expertise to manage GDPR compliance effectively and earn a respected certification recognised across industries.
 

Course Objectives:
 

  • Understand the principles and requirements of GDPR
  • Learn how to implement GDPR-compliant policies and processes
  • Develop skills to conduct Data Protection Impact Assessments (DPIAs)
  • Gain knowledge of lawful bases for data processing and consent management
  • Handle data breaches and implement response strategies effectively
  • Understand the roles and responsibilities of Data Controllers, Processors, and Data Protection Officers (DPOs)
  • Prepare for GDPR compliance audits and interactions with supervisory authorities

Upon completion, learners will be equipped with the knowledge and skills to ensure GDPR compliance, mitigate data protection risks, and lead their organisations confidently in the evolving regulatory landscape.

Course Outline

Certified EU General Data Protection Regulation (EU GDPR) Foundation and Practitioner Course

Module 1: Introduction to the GDPR 

  • GDPR in a Nutshell
  • Generate Customer Confidence
  • Focus of GDPR
  • What is Personal Information?
  • Who has PII?
  • Lawful Processing of Personal Data 
     

Module 2: Binding Corporate Rules

  • Introduction
  • Scope
  • UK ICO’s View of the Scope
  • Processing GDPR Definition
  • Who Processes PII?
  • What is Special Data?
  • Legal Framework
  • Timeline and Derogations
  • Some Key Areas for Derogation
  • Data Breaches/Personal Data Breach
  • Consequences of Failure
  • Governance Framework
     

Module 3: GDPR Terminology and Techniques 

  • Key Roles
  • Data Set
  • Subject Access Request (SAR)
  • Data Protection Impact Assessments (DPIA)
  • What Triggers a Data Protection Impact Assessment?
  • DPIA is Not Required
  • Processes to be Considered for a DPIA
  • Responsibilities
  • DPIA Decision Path
  • DPIA Content
  • How Do I Conduct a DPIA?
  • Signing Off the DPIA
  • Mitigating Risks Identified by the DPIA
  • Privacy by Design and Default
  • External Transfers
  • Profiling
  • Pseudonymisation
  • Principles, User Rights, and Obligations
  • One Stop Shop 
     

Module 4: Structure of the Regulation

  • Parts of the GDPR
  • Format of the Articles
  • Articles 
     

Module 5: Principles and Rights

  • Introduction
  • Legality Principle
  • How the Permissions Work Together ?
  • Lawfulness of Processing Conditions
  • Lawfulness for Special Categories of Data
  • Criminal Offence Data
  • Consent
  • Transparency Principle
  • Fairness Principle
  • Rights of Data Subjects
  • Purpose Limitation Principle
  • Minimisation Principle
  • Accuracy Principle
  • Storage Limitation Principle
  • Integrity and Confidentiality Principle
  • Accountability Principle
     

Module 6: Demonstrating Compliance

  • Demonstrating Compliance with the GDPR
  • Impact of Compliance Failure
  • Administrative Fines
  • What Influences the Size of an Administrative Fine?
  • Joint Controllers
  • Processor Liability Under GDPR
  • Demonstrating Compliance
  • Protecting PII is Only Half the Job
  • What must be Recorded?
  • Additional Ways of Demonstrating Compliance
  • Demonstrating a Robust Process
  • PIMS (Personal Information Management System)
  • Cyber Essentials
  • ISO 27017 Code of Practice for Information Security Controls
  • Risk Management
     

Module 7: Incident Response and Data Breaches

  • What is a Personal Data Breach?
  • Notification Obligations
  • What Breaches Do I Need to Notify the Relevant Supervisory Authority About?
  • What Information Must Be Provided to the SA?
  • How do I Report a Breach to the SA?
  • Notifying Data Subjects
  • What Should I do to Prepare for Breach Reporting?
  • Updating Policies and Procedures
  • Breach Reporting and Responses
  • Ways to Minimise the Breach Impact 
     

Module 8: Understanding the Principle Roles

  • What does the GDPR Makes Businesses Responsible For?
  • Difference Between a Data Controller and a Data Processor
  • How the Roles Split?
  • Controllers and Processors
  • Main Obligations of Data Controllers
  • Demonstrate Compliance
  • Joint Controllers and EU Representative
  • Controller-Processor Contract
  • Maintain Records and Keeping Records for Small Businesses
  • Cooperation with Supervisory Authorities
  • Keeping PII Secure
  • Data Breach Transparency
  • Role of the Data Processor
  • Controller-Processor Contract
  • Main Obligations of the Processor
  • Perform Only the Data Processing Defined by the Data Controller
  • Update the Data Controller
  • Sub-Process or Appointment
  • Keep PII Confidential
  • Maintaining Records
  • Cooperate with Supervisory Authorities
  • Security
  • Appoint a DPO – If Necessary
  • Transferring Data Outside the EU
     

Module 9: Role of the DPO

  • Role of a Data Protection Officer
  • Involvement of the DPO
  • Main Responsibilities of the DPO
  • Working Environment for the DPO
  • Must We Have A DPO?
  • Public Body
  • What does Large Scale mean?
  • Systematic Monitoring
  • Who Can Perform the Role of DPO?
  • Skills Required
  • Monitoring Compliance
  • Training and Awareness
  • Data Protection Impact Assessments (DPIAs)
  • Risk-Based Approach
  • Business Support for the DPO
  • DPO Independence
  • DPO – Conflict of Interest
     

Module 10: UK Implementation

  • Key Differences Between the Data Protection Act and the GDPR
  • Highlights from the Data Protection Bill
  • Definition of Controller
  • Health, Social Work, Education, and Child Abuse
  • Age of Consent
  • Exemptions for Freedom of Expression
  • Research and Statistics
  • Archiving in the Public Interest
     

Module 11: Key Features

  • Specific Permission
  • Privacy by Design
  • Data Portability
  • Right to be Forgotten
  • Definitive Consent
  • Information in Clear Readable Language
  • Limits on the Use of Profiling
  • Everyone Follows the Same Law
  • Adopting Techniques
     

Module 12:  Subject Access Requests and How to Deal with them?

  • Subject Access Requests (SAR)
  • Dealing with SAR
  • Recognise the Request
  • Understand the Time Limitations
  • Dealing with Fees and Excessive Requests
  • Identify, Search, and Gather the Requested Data
  • Learn about What Information to Withhold
  • Developing and Sending a Response
     

Module 13: Data Subject Rights

  • Must I Always Obey a Right?
  • Rights and Third Parties
  • Requests Made on Behalf of Other Data Subjects
  • Guidelines for Children's Maturity
  • Responding to a Rights Request
  • What is a Month?
  • Rights Request Flow Chart
  • Right to be Informed
    • When Should Information Be Provided?
    • Best Practice Guidance
  • Right of Access
  • Right to Rectification
  • Right to Erasure
    • When can I Refuse to Comply with a Request for Erasure?
    • Erasing Children's Data
  • Right to Restrict Processing
    • When Processing Should be Restricted?
    • Protecting PII
    • Other Issues about Restricting Processing
  • Right to Data Portability
  • Right to Object
    • Complying with the Right to Object
    • Rejecting the Right to Object
    • Processing for Direct Marketing Purposes
    • Processing for Research Purposes
  • Rights Related to Automated Decision Making and Profiling
    • When does the Right not apply?
       

Module 14: Subject Access Requests

  • Provenance
  • Overview: SARs
  • SAR is an Activity, Not a Title
  • How can a SAR be Submitted?
  • What Information Should the Response to a SAR Contain?
  • Additional Information
  • Replying to a SAR
  • Confirming a Data Subject’s Identity
  • Scope
  • Electronic Records
  • Non-Electronic Records
  • SARs Involving 3rd Party PII
  • Fees
  • Refusing a Subject Access Request
  • Access Requests from Employees
  • Credit Reference Agencies
  • Best Practice for SARs
     

Module 15: Lawful Processing

  • Lawful Processing: A Reminder
  • User Rights Change Depending on the Justification
  • Lawfulness of Processing Conditions
  • Lawfulness for Special Categories of Data
  • UK ICO Tool
  • Consent
  • Key Points About Consent
  • Affirmative Action and Explicit Consent
  • Introduction of Affirmative Action
  • What is Not Affirmative Action?
  • Examples of Affirmative Action from the ICO
  • Introduction of Explicit Consent
  • Explicit Statement
  • Obtaining Explicit Consent
  • ICOs View of a Poor Form of Explicit Consent
  • Obtaining Consent for Scientific Research Purposes
  • Getting Consent
  • What Should Go into the Consent Request?
  • Consent Granularity
  • Right to Withdraw Consent
  • Children
  • Consent Records
  • ICOs Examples of Record Keeping
  • Key Points When Establishing Consent
  • Legitimate Interests
  • Getting the Balance Right
  • Consent or Legitimate Interest?
  • What Lawful Basis Can be Used for Processing Marketing PII?
     

Module 16: Third Country Data

  • Cross Border Transfers
  • Transfer Mechanisms
  • Derogations
  • Adequacy
  • Adequate Ways to Safeguard Transfers of PII
  • Consent
  • One-Off or Infrequent Transfers
  • Who is Responsible?
  • Transferring PII Between EEA Members
  • Adequate Countries Outside of the EEA
  • Binding Corporate Rules (BCR)
  • What a BCR Must Cover?
  • Authorisation for BCRs
  • EU-US Privacy Shield
  • Privacy Shield Overview
  • Privacy Shield: Mechanics
  • Model Clauses
  • Public Authority Agreements
     

Module 17: Introduction to Protecting Personal Data

  • Need to Secure
  • What is Appropriate?
  • Protecting PII – 3 Key Areas
  • Coverage
  • Defensive Design
  • Single Point of Failure (SPOF)
  • Incident Response
  • Data Breach Reporting Requirements
  • Incident Response Team
     

Module 18: Data Protection Impact Assessments (DPIA)

  • Introduction
  • What Triggers a Data Protection Impact Assessment?
  • Cases Where DPIA is Not Required
  • Benefits of DPIA
  • Processes to be Considered for a DPIA
  • Responsibilities
  • DPIA Decision Path
  • DPIA Content
  • How Do I Conduct A DPIA?
  • Signing Off the DPIA
  • Mitigating Risks Identified by the DPIA
     

Module 19: Need Want Drop

  • Overview
  • Need-Want-Drop: Concept Diagram
  • Need-Want-Drop: Categorising Data
  • Need/Want/Drop Methodology
     

Module 20: Dealing with Third Parties and Data in the Cloud

  • What is Cloud Computing?
  • Myths of Cloud
  • Cloud Challenges
  • Controller-Processor Contract
  • Checklist
  • Data Controller - Summary
     

Module 21: Practical Implications: GDPR

  • Brexit and its Impact on the GDPR
  • Adequacy
  • What does this Mean in Practice?
  • EU and in the United Kingdom Representatives
  • Exemption Rule
  • One-Stop Shop
     

Module 22: Legal Requirements of the GDPR

  • Lawful, Fair, and Transparent Processing
  • Limitation of Purpose, Data and Storage
  • Data Subject Rights
  • Consent
  • Personal Data Breaches
  • Privacy by Design
  • Data Protection Impact Assessment
  • Data Transfers
  • Data Protection Officer
  • Awareness and Training
     

Module 23: Privacy Principles in GDPR

  • Lawfulness, Fairness, and Transparency
  • Purpose Limitation
  • Data Minimisation
  • Accuracy
  • Storage Limitation
  • Integrity and Confidentiality
     

Module 24: Common Data Security Failures, Consequences, and Lessons to be Learnt

  • Common Data Security Failures
  • Consequences
    • Fines Relating to Data Breaches
    • Litigation from Customers Relating to Data Breaches
    • Directors, Officers, and Professional Advisors
    • Reputational Damage
  • Lesson Learned
    • Knowing When and How to Communicate with Affected Individuals is Not Easy
    • GDPR is Important, as are Other Legal Frameworks

Included

Included

  • No course includes are available.

Offered In This Course:

  • vedio Video Content
  • elearning eLearning Materials
  • exam Study Resources
  • certificate Completion Certificate
  • study Tutor Support
  • workbook Interactive Quizzes
Individual Training

Individual Training fosters personal growth, enhances professional skills, and builds confidence.

Get a Quote rightblue-arrow
Corporate Training

Corporate Training improves employee skills, increases productivity, and aligns teams with company objectives.

Learning Options

Discover a range of flexible learning options designed to meet your needs. Select the format that best supports your personal growth and goals.

Online Instructor-Led Training

  • Live virtual classes led by experienced trainers, offering real-time interaction and guidance for optimal learning outcomes.

Online Self-Paced Training

  • Flexible learning at your own pace, with access to comprehensive course materials and resources available anytime, anywhere.

Build your future with Oakwood International

We empower you with the skills, knowledge, and confidence to excel in your career. Join us and take the first step towards realising your professional goals.

Frequently Asked Questions

Q. What topics are covered in the GDPR Foundation and Practitioner Course?

The course covers GDPR principles, compliance strategies, DPIAs, legal bases for data processing, data breach management, and certification preparation.

Q. How can this training benefit my career?

GDPR certification validates your expertise in data protection, enhancing your credentials and career prospects in compliance and data management roles.

Q. Is GDPR applicable only in the EU?

While GDPR is an EU regulation, its requirements apply to organisations worldwide that process the personal data of EU citizens.

Q. What support is provided during the training?

Learners receive comprehensive materials, hands-on exercises, and expert instructor support to ensure practical understanding and application of GDPR concepts.

Q. Is this course suitable for beginners?

Yes, the course is designed for professionals at all levels, providing foundational knowledge for newcomers and advanced strategies for experienced practitioners.

Didn’t Find What You’re Looking For?