Cybercrime and Personal data: the legal aspect

The juridical aspect of the fight against Cybercrime and the protection of personal data.

Training available in blended learning

     

OUR TRAINING OFFER


We are at your disposal to adapt each training module to the level of legal knowledge of the people trained and the specificity of their profession and / or their sector of activity. Beyond the acquisition of theoretical knowledge, the training provided is based on concrete cases from the experience of the intervening lawyer and provides participants with scenarios in which to put directly into practice the achievements.

Training plan

Module 1: RGPD: THE REFORM OF DATA PROTECTION (1 DAY)
     Objectives

  • Master the challenges and obligations related to data protection
  • Anticipate the practical impact of GDPR
  • Prevent the risks associated with the exploitation of personal data
  • Adapt your practice and comply with the RGPD
  • Implement a compliance plan
    Discussed Subjects

  • Introduction
  • RGPD area
  • New obligations imposed on organizations
  • Impacts and compliance
  • The new DPO
  • Penalizations
  • The new role of the CNIL


 Module 2: IT CONTRACTS: SECURE YOUR PRACTICE (1 DAY) 
     Objectives

  • Master the legal framework of the agreements related to the supply, the exploitation or the use of computer goods or services and better define the IT contracts
  • Audit IT contracts and improve negotiation/drafting of sensitive clauses
  • Identify and implement the best practical solutions
    Discussed subjects

  • Before signing, secure the drafting of the contract (specifications, call for offers, etc.)
  • The main clauses to negotiate
  • The main IT contracts (license, maintenance, outsourcing, intellectual services, etc.)
  • The microsoft contract


Module 3: CYBER SECURITY: LEGAL TOOLS TO PROTECT AND RESPOND TO ATTACK

    Objectives

  • React to a cyberattack and secure systems
  • Set up a legal strategy following an attack
  • Master your communication
  • Prepare for a CNIL control
    Discussed subjects

  • The different forms of attacks on the information system
  • The legal framework
  • Legal procedure and the filing of a complaint
  • Notification of the violation of personal data to the CNIL
  • Insurance coverage
  • Audits and preventive actions
  • The communication plan

Prerequisites

General knowledge of the security of information systems.

Trainers

Amina KHALED






Last modified: Sunday, 27 October 2019, 1:36 PM