Privacy Consent Form and Privacy Policy: Practical Training Based on Corporate Case Studies of Violations
jueygrace
$8.80
Early Bird
25%
$6.60
Intermediate / CPPG, ISMS-P, Engineer information security, security training, Industrial Security Exper
As personal information breach incidents expand, customer anxiety grows. During this time, companies have been operating management systems that cannot properly identify personal information and implement safety measures through ISMS-P/ISO27701-based business system operations (lawyers, etc.) and penetration testing (RED TEAM composition, e.g., Coupang) consisting of domestic and international hacking competition winners. Even companies that haven't experienced incidents yet are in a situation where breaches could occur at any time. -The reason is that personal information managers themselves create unmanaged blind spots, such as insufficient methods for obtaining customer consent and inadequate identification of personal information processing status. ->Therefore, there is a need to improve work processes by sharing fines/penalties for domestic companies' consent forms and processing policies (as of December 8, 2025) to transparently disclose to customers the expertise of personal information managers and proper personal information protection safety measures.
Intermediate
CPPG, ISMS-P, Engineer information security




