TOOLS AND TRACKERS

Privacy Engineering: IT Infrastructure Architect

This resource, developed by the IAPP Privacy Engineering Section Advisory Board and part of the Privacy Engineering Domains series, provides an overview on the role of IT infrastructure architects.


Published: 1 July 2023

Last updated: 21 July 2025

View PDF

This resource provides an overview on the role of IT infrastructure architects, whose responsibilities include developing IT infrastructure to ensure data flows between systems have data-use controls in place.

This resource is part of a wider IAPP series on Privacy Engineering Domains, which facilitates a deeper understanding of and collaboration within the increasingly important field of privacy engineering.

CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs


Tags:

Data securityIncident managementPrivacy engineeringRisk managementTechnologyTelecommunicationsCybersecurity lawPrivacy
TOOLS AND TRACKERS

Privacy Engineering: IT Infrastructure Architect

This resource, developed by the IAPP Privacy Engineering Section Advisory Board and part of the Privacy Engineering Domains series, provides an overview on the role of IT infrastructure architects.

Published: 1 July 2023

Last updated: 21 July 2025

View PDF


This resource provides an overview on the role of IT infrastructure architects, whose responsibilities include developing IT infrastructure to ensure data flows between systems have data-use controls in place.

This resource is part of a wider IAPP series on Privacy Engineering Domains, which facilitates a deeper understanding of and collaboration within the increasingly important field of privacy engineering.

CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Tags:

Data securityIncident managementPrivacy engineeringRisk managementTechnologyTelecommunicationsCybersecurity lawPrivacy

Related resources