Training Personal Data Protection in Practice – RODO

Practical information about training

Training description

The training provides a comprehensive knowledge of personal data protection and the practical aspects of implementing RODO in an organization. The program combines elements of theoretical lectures with intensive practical workshops, during which participants will gain the skills necessary to effectively manage personal data processing processes. Classes are conducted with the use of the case study method and interactive group exercises, which allows for effective assimilation of knowledge and its application in everyday work.

Participant profile

  • Data Protection Officers (DPOs).
  • People responsible for information security in the organization
  • Employees of legal and compliance departments
  • IT security specialists
  • Managers and decision makers in organizations that process personal data
  • Information systems administrators
  • HR and marketing employees
  • Individuals preparing for the role of IOD

Agenda

  1. Introduction
  • Training Objective: To familiarize participants with the key principles of data protection
  • Practical aspects of implementing RODO in an organization
  • Presentation of the training program and methodology
  • Participants’ expectations and individual training needs
  1. RODO basics
  • Genesis and objectives of the regulation: history, needs for implementation, and main goals of RODO
  • PUODO recommendations and interpretations and their practical significance
  • Definitions and key terms: personal data, data subject, controller and processor
  • Consent to data processing, pseudonymization and anonymization of information
  1. Principles of personal data processing
  • Legality, reliability and transparency: a discussion of the legal basis for data processing
  • Target reduction and data minimization: practical implementation
  • Correctness and limitation of storage: data lifecycle management
  • Accountability principle: how to document compliance with RODO
  1. Rights of data subjects
  • Data access and rectification: procedures and deadlines for implementation
  • Deletion of data (right to be forgotten): technical and organizational challenges
  • Data portability: format and how to exercise the right
  • Right to restrict processing and object: responding to requests
  1. Responsibilities of the controller and processor
  • Records management: records of processing activities
  • Internal policies and procedures for data protection
  • Processing entrustment agreements: key elements and responsibilities of the parties
  • Data protection impact assessment (DPIA): methodology and examples
  1. Risk analysis
  • Threat identification: methods for detecting potential threats to data
  • Risk assessment: techniques for evaluating the likelihood and impact of hazards
  • Planning countermeasures: strategies to minimize risks
  • Practical examples: workshops on conducting risk analysis
  1. Security of personal data
  • Technical measures to secure data: encryption, pseudonymization, access control
  • Organizational measures: training, security policies, privilege management
  • Incident management: breach response procedures
  • Notification obligations: communication with PUODO and data subjects
  1. Practical module – implementation of RODO
  • Mapping the organization’s data processing processes
  • Create and update data protection documentation
  • Conduct risk analysis and DPIA
  • Implementation of procedures to realize the rights of data subjects
  1. Workshops and case studies
  • Analysis of data breaches and lessons learned
  • Examples of proper implementation of RODO in various industries
  • Group exercise: simulation of a security incident
  • Develop strategies for responding to reports from data subjects
  1. Question and answer session
  • Discussion and exchange of participants’ experiences
  • Clarification of individual concerns
  • Analysis of specific cases reported by participants
  • Summary of key findings and practical tips

Benefits

  • Practical knowledge of interpreting and applying the provisions of RODO in everyday work
  • Ability to identify and categorize personal data in the organization
  • Methods for conducting data processing risk analysis
  • Knowledge of creating and managing the documentation required by RODO
  • Ability to respond to requests from data subjects
  • Procedures for reporting and managing data breach incidents
  • Principles of designing processes in accordance with the concept of privacy by design
  • Practical tools to implement and maintain RODO compliance

Required preparation of participants

  • Basic knowledge of legal issues related to business operations
  • General knowledge about data protection and privacy
  • Understand the basic concepts of information security
  • Experience working with personal data in an organization
  • Knowledge of your organization’s business processes

Issues

  • Legal grounds for processing personal data
  • Consent for data processing: acquisition and management
  • Data retention and information lifecycle management
  • Register of data processing activities
  • Data Protection Impact Assessment (DPIA)
  • Risk analysis in personal data protection
  • Rights of data subjects
  • Responsibilities of the data controller and processors
  • Privacy by design and privacy by default
  • Reporting of data protection violations
  • The role and tasks of the Data Protection Officer
  • Cooperation with the supervisory authority (PUODO)

Do you have any questions?
Feel free to contact us.

Anna Polak
+48 600 010 440
anna.polak@eitt.pl
31 Ząbkowska Street
03-736 Warsaw

Forms of training delivery

Stationary training

  • Training at the customer's premises or at a designated location
  • Training room equipped with the necessary equipment
  • Training materials in electronic form
  • Coffee breaks and lunch
  • Direct interaction with the trainer
  • Networking in a group
  • Workshop exercises in teams

Remote training

  • Virtual training environment
  • Electronic materials
  • Interactive online exercises
  • Breakout rooms for group work
  • Technical support during the training
  • Recordings of the session (optional)

Possibility of funding

The training can be financed with public funds under:

  • National Training Fund (KFS)
  • Development Services Base (BUR)
  • EU projects implemented by PARP
  • HR Academy Program (PARP)
  • Regional operational programs

If you are interested in funding, our team will help you prepare the required documentation.

+48 22 487 84 90

biuro@eitt.pl

?
?
I have read and accept the privacy policy. *

They trusted us

See more

Get to know our company

Who we are

We create
dedicated workshops

Team

A team of experienced
expert practitioners

Accreditations

We focus on the highest quality
training services

Do you have any questions?
Feel free to contact us.

Anna Polak
+48 600 010 440
anna.polak@eitt.pl
31 Ząbkowska Street
03-736 Warsaw

FAQ - Frequently Asked Questions

We offer training in a variety of tailored formats: onsite (at the client's location or our training center), live online interactive with a trainer, and in a hybrid format. Detailed information about the available delivery forms for a specific training is always included in its description on the website.
Open online trainings usually take place from 9:00 - 17:00 Polish time. In the case of closed trainings dedicated to companies, the schedule is flexible and we arrange it individually with the client to best fit the needs of the organization.
We use proven and popular video conferencing platforms, such as Microsoft Teams and Zoom, to conduct interactive online training. They provide seamless communication, the ability to work in groups and direct contact with the trainer. We provide information about the platform used in a specific training to participants before the training begins.
To comfortably participate in the online training, all you need is a standard computer (desktop or laptop) with stable internet access and an up-to-date version of a web browser installed. We recommend using headphones with a microphone for better sound quality and communication, although this is not absolutely required. Having a webcam is usually not mandatory either.
Yes, each participant receives a set of training materials prepared by our experts. We usually provide them in electronic form (e.g., PDF files) a few days before the start of the training, after confirmation of participation and payment.
Upon successful completion of most of our training courses, participants receive a named EITT Certificate of Completion, confirming the competencies gained. In addition, we offer accredited training courses (e.g., ITIL®, PRINCE2®) that prepare for official internationally recognized certification exams. Information about the type of certificate available after a specific training is always included in the detailed description of the training.
The enrollment process depends on the type of training. For open trainings (open to anyone who is interested), you can sign up directly through the application form available on the page of the particular training. If you are interested in closed training (dedicated to employees of one company), please contact us directly by email or phone - we will prepare an offer tailored to your needs.
As standard, the price of the training includes: participation in classes taught by an experienced trainer-practitioner, a set of original training materials in electronic form, and a named EITT Certificate of Completion. For accredited training courses, the price often also includes the cost of taking the official certification exam. The detailed scope of benefits for a given course is always given in its description.
The preferred form of payment for our training courses is by bank transfer, executed on the basis of an issued pro forma invoice or VAT invoice. Detailed information on payment terms and conditions is provided in the process of confirming the enrollment in the training or can be found in the regulations.
Of course! Our specialty is closed-door training, designed "tailor-made" - according to the individual needs and business objectives of a given organization. If you are interested in a topic outside of our regular offerings or would like to modify the program of an existing course, feel free to contact us. We will be happy to prepare a dedicated solution.
We are flexible and adapt to the client's needs. We can organize closed trainings even for small groups - usually the minimum number of participants is 4 people, and the cost is often calculated for the whole group. Taking care of the highest quality and comfort of learning, in case of very large groups (more than 40 people) we usually recommend dividing into smaller teams to ensure effective interaction.
Your feedback is extremely important to us, as it allows us to continuously improve our offerings. After each training session, we send participants a link to a short online evaluation survey. You can also always contact us directly by email or phone to provide your comments.
  1. One-pager invitation with deadlines
  2. Project kick-off
  3. Strategic leadership and thinking
  4. Communication and Cooperation. Conflict management
  5. Motivating, engaging and difficult decisions in business
  6. Managing Change and Innovation. Leadership in crisis
  7. Building the organization of the future
  8. Best practices workshop - retrospective; creating a coherent program for middle and lower management levels