Privacy Ref Blog

Privacy Awareness: Training lays the foundation

A successful privacy awareness program includes ongoing activities to keep privacy “top of mind” for the members of an organization. It supplements a privacy training program that conveys information in a formal learning environment. For an awareness program to meet its goals, a training program must prove the foundation for your privacy program.

Information to include in a privacy training program

Privacy training has the challenge of establishing the basic concepts of privacy that relate to all your stakeholders. The training must also convey how trainees must behave to meet the organizational requirements for protecting personal information. To successfully and efficiently  teach the basics of privacy while maintaining the interest of the attendees, it is useful to break the audience into groups with common responsibilities for utilizing and protecting personal information.

Consider a multinational corporation. Those people with global responsibilities, such as a centralized information technology or human resources function, should be identified to receive privacy basics with a global perspective. However, members of divisions that operate in a single jurisdiction may receive privacy background information that is relevant to them with acknowledgement of privacy requirements in other jurisdictions. A US-based division, for example, would have training that focuses on the nature of privacy in the US with some limited commentary about European and other jurisdictional requirements from around the world.

Information on organizational expectations for protecting personal information, however, should be consistent for all parties being trained.

When to give privacy training

Privacy training should be provided when someone begins working for an organization and then annually thereafter. A central resource, such as HR, should be used to track who has been trained and when.

One strategy that some organizations apply to insure that privacy training is completed in a timely manner is to deny access to computer systems for those staff members who are not up to date on their privacy training. This not only raises the priority of the training for the staff, but creates the time for them to take the training if they are late and reduces the risk of their inadvertently violating organizational privacy policy.

Training should be provided to everyone processing or accessing personal information on behalf of an organization. This includes not only direct employees at any level, but contractors and temporary workers as well. Often, the training of these last two groups is left to the manager to which they will report essentially insuring that the training is unlikely to occur.

How to give privacy training

Formal privacy training can be provided any of several ways. Classroom training provides the best way to convey this information; recent events may be used as examples during the training plus questions posed by the attendees may be answered immediately. Also, the training may be customized to address local cultural requirements.

A second approach is to give training through a webinar. Here again, recent events can be used as examples and questions may be answered. That local touch, however, is missing.

A third approach is to use computer-based training, or CBT. Utilizing this approach ensures uniform training is to all participants. It also allows participants to take the training at a time when their schedule and workload permits. CBT also allows for a quiz to be given to the participants once the training is completed to make sure their understanding of the information presented. However, CBT cannot take advantage of using recent events as examples, nor offer an easy way to have questions addressed.

Executive participation, a key to training success

Some of the most successful privacy training I have seen included endorsement by a senior executive at the start of a class. Optimally an executive would give an introduction with personal insight prior to the start of a class or a webinar. Alternatively, a video of an executive providing this same perspective may be used.

Also, the impact of an executive attending the same training as everyone else in an organization should not be overlooked. At a recent training series I conducted, members of the “C” suite were in attendance. In addition to re-enforcing how important privacy is to an organization simply by their participation, the executive re-enforced the messages included in the training during the breaks when speaking with the other staff members.

  • author's avatar

    By: Bob Siegel

    Bob Siegel, the founder and President of Privacy Ref, Inc., has extensive professional experience in the development and improvement of privacy policies and procedures, the definition of performance metrics to evaluate privacy maturity, and the evaluation of compliance. He utilizes a combination of alignment, adaptability, and accountability strategies to guide organizations in achieving their privacy goals.

    He is a Fellow of Information Privacy (FIP) and a Certified Information Privacy Professional, awarded from the International Association of Privacy Professionals, with concentrations in U.S. private-sector law (CIPP/US), US public sector law (CIPP/G), European law (CIPP/E), and Canadian law (CIPP/C). He is also a Certified Information Privacy Manager (CIPM) and Privacy Technologist (CIPT).

    Siegel is a member of the IAPP faculty, has served on the Certification Advisory Board for the CIPM program the Publications Advisory Board.

    Siegel also writes the blog “Operational Privacy” on

  • author's avatar

  • author's avatar

    CNIL’s Google Fine of 50 million Euros
    In praise of a privacy compliance program
    Looking to 2019 Privacy Plans
    Preparing your customer-facing staff
    Automation for Privacy

    See all this author’s posts

Privacy Ref provides consulting and assessment services to build and improve organizational privacy programs. For more information call Privacy Ref at (888) 470-1528 or email us at

Posted on September 7, 2014 by Bob Siegel
Tags: ,

« »

No Responses

Comments are closed.

« »

Subscribe to our mailing list

Please fill out the form below.


Want to find out more?

Simply go to the contact page, fill out the form, and someone from Privacy Ref will be in touch with you. You can also send an email to or call (888) 470-1528.


April 16, 2018

IAPP Training Classes
Privacy Ref is proud to announce that we are an official training partner of the IAPP. You now have the opportunity to learn from one of our knowledgeable privacy professionals using the most respected training content in the industry. The robust interactive training offered, aids in the understanding of critical privacy concepts. The contents of the courses are integral to obtaining your privacy certifications and to educate your new team. Learn more here.

Latest Blog Posts

March 15, 2019

Protecting kids online – are we doing our best?

I’m trying to work through some thoughts about how companies repeatedly take advantage of consumers’ privacy in the US.  The latest being TikTok, a video sharing app acquired from, which has agreed to pay $5.7 million to settle allegations that it collected personal information from children – a violation of COPPA or the Children’s Online Privacy Protection Act.  Of note, TikTok is a $75 billion – with a B – dollar startup.  In GDPR terms, the maximum fine for egregious behavior could be 4% of gross revenues or in TikTok’s case $3 billion – with a B – dollars, which is a far cry from the fine that the FTC assessed for their alleged COPPA violations (FTC’s largest ever COPPA fine).

Continue reading this post...

March 13, 2019

In da House (of Representatives)

Recently, the US Congress met to discuss privacy protections from the perspective of a federal regulation. One of the most discussed topics was GDPR and whether it works or not. A lot was said, and I was pretty disappointed with the overall lack of nuance with regards to understanding what privacy is about from sitting politicians. That said, I want to go over some of the arguments.

Continue reading this post...

Other Recent Posts