inflearn logo

Practical training based on cases of corporate errors in privacy consent forms and privacy policies.

As customer anxiety grows due to the expansion of personal information leak incidents, companies have been operating management systems that fail to properly identify personal data or implement adequate security measures. These systems have relied on operational frameworks based on ISMS-P/ISO27701 standards (managed by lawyers, etc.) and penetration testing (RED TEAMs, e.g., Coupang) composed of winners from domestic and international hacking competitions. Even companies that have not yet experienced an incident are in a situation where a leak could occur at any time. - The reason is that personal information managers are creating unmanaged blind spots themselves, such as through inadequate methods of obtaining customer consent and insufficient identification of personal information processing statuses. -> Therefore, it is necessary to share information regarding fines and penalties (as of 2024.12.8) related to domestic companies' consent forms and privacy policies. This will improve business operations by enhancing the expertise of personal information managers and ensuring that proper security measures for personal information protection are transparently disclosed to customers.

4 learners are taking this course

Level Intermediate

Course period 6 months

ISMS-P
ISMS-P
CPPG
CPPG
Engineer information security
Engineer information security
security training
security training
Industrial Security Exper
Industrial Security Exper
ISMS-P
ISMS-P
CPPG
CPPG
Engineer information security
Engineer information security
security training
security training
Industrial Security Exper
Industrial Security Exper

What you will gain after the course

  • Personal Information Consent Form Management Plan as a Privacy Officer (Company-wide Inspection and Improvement)

  • As a personal information officer, management plan for the Privacy Policy (Full investigation and improvement across all departments regarding online/offline disclosure)

🔐 Why does personal information leakage keep happening?

👉 "Practice-oriented Personal Information Inspection Lecture" that practitioners must know is now open! (No Audio)

Recent personal information leakage incidents occurring at Coupang, the three major mobile carriers, and various public institutions and private companies are not simple system errors.
Most of the causes are a lack of understanding of laws by personal information managers, inadequate management of consent forms and processing policies, lack of regular inspections, and a lack of experts.

It is time for a change.
And this training is a hands-on course designed to allow practitioners to experience that change firsthand.


📌 Why should you take this course?

🧩 1. "Field Case-Centered" rather than "Legal Interpretation"

  • Practice by capturing the consent forms and privacy policies of websites currently in operation

  • Sejong Special Self-Governing City's failure to distinguish between mandatory and optional consent của Thành phố tự trị đặc biệt Sejong

  • National Daegu Science Museum's error of obtaining consent through the privacy policy của Bảo tàng Khoa học Quốc gia Daegu

  • Korail Logistics' mismatch between mandatory and optional items and unnecessary mandatory consent issues

  • Ulsan Buk-gu District Office's case of failing to disclose CI after collection
    → You can directly check examples that could actually be caught like this and learn correction methods immediately.→ Bạn có thể trực tiếp kiểm tra những ví dụ thực tế có thể bị phát hiện như thế này và học ngay phương pháp khắc phục.

⚠️ 2. Realistic education focused on "fines and penalties"

  • Failure to register personal information files

  • Mixing of mandatory and optional items

  • Errors in consent for processing entrustment and third-party provision

  • Omission of retention period

  • Inadequate highlighting of important items during written consent
    → We provide guidance on what specific penalties each error leads to, based on actual legal sanction standards.

💡 3. Providing an inspection checklist that practitioners can apply immediately

  • Consent Form Review Criteria

  • Mandatory items for the privacy policy

  • Statutory elements that must be disclosed when operating a website

  • Inspection logic to immediately identify missing items
    → Structured for immediate application in the field after the lecture.


🎯 Who this lecture is especially for

  • Personal information managers in public institutions, public enterprises, and local governments

  • Website operation and member management practitioners

  • Beginner managers who find it difficult to understand the practical application of the Personal Information Protection Act

  • Managers who are anxious because an institutional inspection is approaching

  • Any organization that is unsure whether their consent forms and privacy policies have been drafted correctly.


🎓 Key Points of the Training

🔍 Error analysis based on real-world cases
🛠 Practice-oriented lecture structure using captured screens
📑 Clear summary of points where fines and penalties occur
🧭 Provision of immediately applicable operational guides
⚙️ Acquisition of customized inspection logic for each institution and company
📌 Strengthening the ability to identify risk items that must be corrected


🚀 This is different from any privacy training you've experienced before.

This is not a theoretical lecture that ends with simply reading legal provisions.
It is a training session designed to ensure 100% practical proficiency by directly examining actual incorrect consent forms and privacy policies to identify issues and learn how to correct them..

A personal information leak can occur from just a single mistake.
However, what is needed to prevent that one mistake is expertise and practical experience.
This training will be the fastest way for your organization and company to escape the risks of fines, penalties, and loss of credibility.

Recommended for
these people

Who is this course right for?

  • Privacy Officer

  • Chief Privacy Officer (CPO)

Need to know before starting?

  • Understanding Personal Information Management System (ISMS-P and ISO27701) Certification

  • Understanding Privacy Impact Assessment (PIA) and Privacy Level Assessment

Hello
This is jueygrace

246

Learners

19

Reviews

4.1

Rating

39

Courses

Security Consulting

Curriculum

All

3 lectures ∙ (19min)

Published: 
Last updated: 

Reviews

Not enough reviews.
Please write a valuable review that helps everyone!

jueygrace's other courses

Check out other courses by the instructor!

Similar courses

Explore other courses in the same field!

25% off for new members

$8.80

25%

$8.80