Sensitive Personal Information (SPI) classification
Concepts like “Do Not Sell or Share My Info”
Service Provider vs. Third Party
Enforcement by California Privacy Protection Agency (CPPA)
Other Global Regulations (High-level):
Brazil LGPD, Saudi PDPL, South Africa POPIA, India DPDP, etc.
Compare their scope, definitions, consent requirements, penalties
💡 Key Pointers for Interview
Be ready to explain data subject rights and how you’d operationalize them.
Discuss how GDPR applies extra-territorially (even if the company isn't in the EU).
Highlight how you interpret the legal basis for processing in practical scenarios.
Mention differences between GDPR and CCPA—especially in terminology and obligations.
📚 Recommended Study Resources
IAPP CIPP/E Textbook & Exam Blueprint
EU GDPR: A Practical Guide to Implementing – by IT Governance
CCPA Compliance Guide – TrustArc
GDPR Summary by ICO (UK)
IAPP Daily Dashboard – Stay current on regulatory trends
2. PIA, DPIA & Data Mapping
✅ What to Learn
PIA (Privacy Impact Assessment): General term used for assessing privacy risks in any data-processing initiative.
DPIA (Data Protection Impact Assessment): Specific GDPR-mandated assessment required when processing is likely to result in high risk to individuals' rights.
When DPIAs are required: Large-scale profiling, tracking, processing sensitive data, surveillance.
Steps:
Describe processing & purpose
Assess necessity & proportionality
Identify risks to individuals
Suggest mitigation strategies
Data Mapping:
Identify data categories (PII, SPI, etc.)
Understand data flows (source, destination, systems, third parties)
Record of Processing Activities (RoPA)
💡 Key Pointers
Be able to walk through a DPIA you’ve conducted or a mock scenario.
Mention tools used (e.g., OneTrust, Excel-based templates).
Stress collaboration with Legal, IT, Security teams.
📚 Resources
ICO DPIA Guide + Template
OneTrust Academy – DPIA module
IAPP articles on effective data mapping
Nymity DPIA Best Practices
3. Privacy-Strategy & Roadmaps
✅ What to Learn
Building a Privacy Program from scratch:
Governance model
Roles (DPO, privacy leads)
Budgeting and timelines
Communication plan
Using maturity models (e.g., initial → repeatable → defined → managed → optimized)
Key elements: assessments, gap analysis, policies, training, audits, automation
💡 Key Pointers
Have a sample 12-month roadmap ready: Gap Assessment → Policy Dev → DPIA → Training → Monitoring.
Show understanding of business alignment: link privacy to risk, reputation, customer trust.
📚 Resources
IAPP whitepaper: "How to Build a Privacy Program"
NIST Privacy Framework
ISO/IEC 27701 (privacy extension to ISO 27001)
Gartner or Forrester Maturity Models
4. DPP Policies & Procedures
✅ What to Learn
Key policies:
Data Protection Policy
Retention Policy
DSAR Handling Policy
Breach Notification Policy
Third-party Management
Structure of a good policy: scope, responsibilities, definitions, procedures, enforcement
💡 Key Pointers
Highlight policy version control, stakeholder approvals, and review cycles.
Explain how you operationalize policies (e.g., integrate DSAR procedure into ticketing system).