Privacy Program Operations

 

Resource Center / Topic Pages / Privacy Program Operations

Image

Privacy Program Operations

TOPIC PAGE

Navigate Page

On this topic page, you can find the IAPP’s collection of coverage, analysis and resources covering privacy program operations.

  • expand_more

    Privacy Program Management

    This IAPP textbook for the Certified Information Privacy Manager (CIPM) program provides critical knowledge for managing privacy program governance and operations.
    View here

    Strategic Privacy by Design
    This IAPP textbook contains a methodology for building privacy into a product, service, or business process.
    View here


News Articles

View all News Articles

How to train AI lawfully?


Where should privacy sit within an organization? Legal or compliance is best


Behind Ontario’s IPC newly updated deidentification guidelines


ISO updates standard on managing privacy compliance programs


A view from DC: Don’t mess up your employee privacy notice


With SB 53, California puts AI disclosure requirements on the map


How AI is compelling a rethink on organizational cybersecurity strategies


A view from Brussels: The balancing act of simplifying the EU digital rulebook


Post-quantum trust architectures: Future-proofing privacy, provenance, and verifiability


A case study in China privacy operations: The Dior wake-up call


Responsible AI governance shouldn’t start — much less end — at legal compliance


Vietnam’s draft digital transformation law proposes ‘far-reaching’ paradigm for digital platforms


Beyond job displacement: Operational fragility is the real AI risk


A case study in privacy operations: The Maryland SPI rule


What the proposed Anthropic copyright settlement could mean for AI data deletion policies


Implementing a DPA program: A perspective from Botswana


CJEU clarifies personal data definition in context of pseudonymization


The reality of privacy work


Model drift, data leaks and deepfakes: Rethinking AI governance in the age of autonomous risk


The rise of AI in cybersecurity: Finding the right balance between security and privacy


Luminos.AI, ZwillGen partner on AI law platform to help scale common governance practices


Privacy engineering for AI machine learning: Addressing algorithmic disgorgement risks during product development


Why the increase in business representatives in the EU?


Achieving privacy excellence: Understanding the privacy maturity model


A view from Brussels: Addressing data retention discrepancies


The next chapter for ROPAs


Navigate 2025: How individuals’ feelings inform AI governance practices


There’s no opting-out of universal opt-outs


Rebuilding digital trust: How blockchain is making privacy a default


What Brazil’s ANPD expects from companies using generative AI


From compliance cost to competitive edge: How privacy leaders can command the executive table


Key takeaways from Ireland’s DPC annual report


Meta’s risk assessment updates look toward ‘holistic’ approach


Japan passes innovation-focused AI governance bill


Right-sizing AI governance: Starting the conversation for SMEs


Insights from the ANPD’s new technical note on automated decisions


Home sweet home or location, location, location: The best place for your company’s privacy office


Mirror, mirror: Navigating privacy and AI compliance with digital clones


Cloud-based test automation: Managing data privacy risks in regulatory technology environments


The EU AI Act and copyrights compliance


Privacy review: How to develop an internal data analytics program


Artificial illusion: Global governance challenges of deepfake technology


Handsets, headsets and hyperscreens: Emerging ideas for immersive experiences and the importance of governance by design


The myth of anonymization: Why AI needs a new privacy paradigm


The FTC and the future of third-party due diligence


Operational impacts of the EDPB’s opinion on data protection in AI models


Why privacy should be the marketing industry nonnegotiable in 2025


The quiet revolution in workplace tech


The AEPD’s approach to AI: Smarter models, better compliance


First case on PIPL’s extraterritorial scope highlights key compliance priorities


Foundational considerations in mitigating AI data risk


Will AI replace me?


The EU Digital Services Act: Ready to meet reporting obligations?


Beyond compliance: The case for adaptive AI governance


Maturing the AI Literacy Program


Privacy and security: Better together


Preparing for compliance: Key differences between EU, Chinese AI regulations


Key considerations when setting up model data protection clauses


Designing an AI literacy program


The shadow data market: Privacy risks lurking in forgotten information


How to implement effective privacy training


Understanding AI literacy


10 areas for US-based privacy programs to focus in 2025


View More


Research Articles and Reports

View all Research Articles and Reports

Whose risk is it anyway? How positions and perspectives inform digital risks


Risk analysis is the foundation of data security, but regulator approaches differ


Salary and Jobs Report 2025-26


AI governance in the agentic era


The ethical use of AI in advertising


Compliance technology adoption: Navigating and overcoming challenges


AI Governance Profession Report 2025


US Data Privacy Litigation: Litigating accountability through shareholder action


Benchmarking salary for digital responsibility


US Data Privacy Litigation: Security breach litigation


Top 10 operational impacts of the EU AI Act


Privacy Governance Report 2024


Top 10 operational impacts of India’s DPDPA


Top 10 operational impacts of India’s DPDPA – Consent management


Responsible AI Management Report


Amending Australia’s Privacy Act: Small businesses, bigger responsibilities


Professionalizing Organizational AI Governance Report


Implications of the AI executive order for business


Top 10 operational impacts of India’s DPDPA – Obligations of data processing entities


Privacy governance: A problem solved or an ongoing challenge?


Privacy Risk Study 2023


A trans-Atlantic comparison of a real struggle: Anonymized, deidentified or aggregated?


Privacy and AI Governance Report


The alignment problem with sale of data


Maximize your minimization and other takeaways from the FTC’s Drizly case


Top 5 Operational Impacts of China’s PIPL


Privacy in M&A Transactions Playbook


Privacy as a competitive differentiator: Building an effective and strategic healthcare privacy program


Vaccine credential systems: Considerations for US employers


Ransomware, data protection and compliance


Top 10 operational impacts of the CPRA


Privacy in the Wake of COVID-19


Privacy Leaders’ Views – The Impact of COVID-19 on Privacy Priorities, Practices and Programs


Top 5 operational impacts of Brazil’s LGPD


Benefits, Attributes and Habits of Mature Privacy and Data Protection Programs


State of Data Rights Report


The Skill Set Technologists Need to Implement a Privacy Risk Management Framework


How to Build a Culture of Privacy


Measuring Privacy Operations Report


How Privacy Tech Is Bought and Deployed Report


CCPA offers minimal advantages for deidentification, pseudonymization, and aggregation


Top 5 Operational Impacts of the CCPA


Applying the Positive-Sum Principle for Successful Privacy by Design Outcomes


Six Ways Privacy Awareness Training Will Transform Your Staff


Must-Have Privacy Training Features for Your Team


Privacy and Data Security is for Everyone


They Did What? Top Privacy Mistakes To Watch Out For (and How To Avoid Them)


DPO Outsourcing Series


Top 10 operational responses to the GDPR


How Privacy Awareness Builds Trust


GDPR Compliance Report


Monetizing Personal Information Series


Check or Mate? Strategic Privacy by Design


Benchmarking your Privacy Incident Management Program


GDPR Matchup Series


Shopping Smart for Cyberinsurance Series


Assessing Mobile App Data Privacy Risk


Incident Response Series


Getting to the ROI of Privacy


Ransomware Epidemic Series


Building a Program that Provides Value


Key Attributes of a Successful Privacy Program


How the C-Suite Should Talk About Cybersecurity


Starting up privacy at a start-up


How IT and Infosec Value Privacy Report


The Top 10 Operational Impacts of the GDPR


Monitoring Your Privacy Program Series


Third-Party Vendor Management Means Managing Your Own Risk


Top 45 Security and Privacy Blind Spots


Privacy, Security and Practical Considerations for Developing or Enhancing a BYOD Program


Managing Your Data Breach


Ten Steps to a Quality Privacy Program


Privacy Policies: How To Communicate Effectively with Consumers


View More


Podcasts, Videos, Web Conferences

View all: Podcasts, Videos, Web Conferences

EU digital law and policy: Making sense of the matrix


Data foundations for AI success: How governance powers privacy and compliance


AI governance in the agentic era


Data domino effect: How one missed data point can threaten your privacy program


The EU AI Act is here: Are global organizations ready?


Anticipating and preparing for changes in AI policy


New EU Mandate: What it means for your digital governance program (Part 2)


UK Data Act: Key provisions and next steps for implementation


Agentic AI: Navigating the tension between privacy and the next generation of AI


Data governance and metaverse technologies


New EU Mandate: What it means for your digital governance program


Privacy for risk management: Bridge the business, technology and compliance gaps


Meta’s risk evolution: Automating privacy reviews for integrated digital governance


The impact of AI on companies of all sizes


The real-world work and right-now experience around AI governance in matters related to children


The strategic privacy pro: How to be a partner, not a blocker


The privacy gym: Get your data in shape!


The reluctant privacy pro: Shortcuts and tips for marketing, security, IT & more


A discussion with NYC CPO Michael Fitzpatrick


A blueprint for efficient SRRs: Mastering your subject rights workflow


Sleeping giant of privacy, security and e-discovery data deletion


Discovering the ROI of privacy automation


Getting bang for your buck: Spending your 2025 privacy budget wisely


Data deletion ‘Jeopardy’: Minimizing risk in a data-driven world


Privacy pros: Why collaborate with sales and marketing and how to do it well


AI red teaming strategy and risk assessments: A conversation with Brenda Leong


Unlock privacy ROI: Why making cross-functional allies is key


30 countries, 200+ domains, one end goal: Managing privacy compliance at scale


Data governance approaches to mitigating AI risk


Automated decision-making: Navigating your compliance obligations


Why privacy is your secret weapon against third-party risk


Organizational Digital Responsibility in Practice


Implementing AI governance in a global compliance environment


Future-proofing consent: Effective compliance in a changing landscape


Navigating the regulation jungle: Be compliant, work efficiently and stay sane


The cost of noncompliance: More than just fines


Securing buy-in: Making the business case for data privacy


Building the case: Get buy-in to minimize data across your organization


Beyond setup: Key steps to continuous compliance in consent management


Building an AI governance and compliance program


Bringing your AI policy to life: Operationalizing key strategies for governance


Universal consent: Building beyond cookie consent


Auditing consent: Essential strategies for improving consent compliance in 2024


Best practices for building and enforcing global retention schedules


3 steps to elevating your third-party risk management process


Mastering the art of AI governance to unlock generative AI innovation


Data Privacy Day: How privacy champions can build a privacy-centric culture


Prioritizing privacy to bolster trust in innovation


Foundations for an effective AI governance program


Privacy by design to evolve beyond compliance & enforce responsible use of data


Managing privacy in the era of generative AI


The building blocks for managing privacy risks at Square Enix


Getting companies to embrace a holistic data strategy


Changing Privacy and Stakeholder Management for a Cloud-First World


Weathering the storm: Building an effective privacy budget & proving ROI in 2023


State AGs and Privacy in 2023: What Your Business Needs to Know


Leveraging privacy governance for the responsible use of AI


Five ways to build a bulletproof PBD program with your security partners


Taking your EU GDPR program across the pond


Privacy by Code: Filling the Gap in Your Privacy Programs


What Your Business Should Be Doing Now to Unlock Privacy Benefits


Data Lifecycle: The Privacy Path Less Chosen


Next Gen Privacy: Breathing life into your legacy inventory process


How to future-proof your privacy program


Automated Data Mapping That Charts the Course for Privacy and Beyond


Three Ways Privacy and Security Can Crush Third-Party Reviews – as Friends


Perfecting Privacy Practices


Privacy Metrics to Uplevel Your Privacy Program


Consumer Perspectives on Data Privacy and Implications for Business Growth


Managing Privacy Risk and Safeguarding Personal Information


The Importance of Diversity in the Privacy Office: A U.S. Perspective


Data Retention: The Blind Spot in Your Privacy Program


How To Build An Effective Privacy Engineering Team


Marketing and Consumer Experience Perspectives to Enhance Your Privacy Program


Practical Tips for Building Your Privacy Operations


Establishing Repeatable and Scalable Privacy Programs


A Practitioner Approach to Implementing Data Protection & Privacy by Design


From Programs to Programmatic: New Mindsets & Methods for Privacy Challenges


Why Privacy Departments Hold the Key to Incident Response


Rethinking notice and consent: A chat with Jen King


Building a Resilient Privacy Program and Operation


Building a Next Generation Practice Leadership


Privacy Metrics: Measuring Privacy Programs


Privacy KPIs: Showing the Business Your Privacy Management is Effective


The 7 Sins of Managing Data Privacy


D&I and Your Privacy Program: A Discussion on Intersectionality


A 360-Degree View of Enterprise-wide Privacy Risk


Privacy Compliance Meets IT


Privacy Program Remediation to Incorporate Legacy Systems


Building a Privacy Culture: A Conversation with Privacy Program Managers


Building a Privacy Culture in Our Conflicted Age


Practical Primer on Privacy Preparedness


Strategic Vendor Risk Management for Privacy Pros


Building a Privacy Program from Ground Zero


View More


Back to Top