Course Overview O v e r v i e w
- Course Overview
- Course Outline
- What’s Included
- What You’ll Learn
- Exam Details
Certified EU General Data Protection Regulation (EU GDPR) Foundation and Practitioner Overview
The Certified General Data Protection Regulation (EU GDPR) Foundation and Practitioner Course introduce the core principles of data protection, individual rights, and lawful processing under EU regulations. Learners gain clarity on legal obligations, accountability roles, and the impact of GDPR on organisations.
Formal training helps professionals understand compliance requirements and apply GDPR practices with confidence. It strengthens awareness, reduces compliance risks, and enables responsible data governance. Learners become capable contributors to data protection strategies.
At Training Deals, we deliver GDPR training that blends regulatory knowledge with practical implementation. Our expert trainers simplify legal frameworks and guide learners through real scenarios. With flexible formats and continuous support, we ensure effective GDPR readiness.
Certified EU General Data Protection Regulation (EU GDPR) Foundation and Practitioner Outline
Module 1: Introduction to the GDPR
GDPR in a Nutshell
Generate Customer Confidence
Focus of GDPR
What is Personal Information?
Who has PII?
Lawful Processing of Personal Data
Module 2: Binding Corporate Rules
Introduction
Scope
UK ICO’s View of the Scope
Processing GDPR Definition
Who Processes PII?
What is Special Data?
Legal Framework
Timeline and Derogations
Some Key Areas for Derogation
Data Breaches/Personal Data Breach
Consequences of Failure
Governance Framework
Module 3: GDPR Terminology and Techniques
Key Roles
Data Set
Subject Access Request (SAR)
Data Protection Impact Assessments (DPIA)
What Triggers a Data Protection Impact Assessment?
DPIA is Not Required
Processes to be Considered for a DPIA
Responsibilities
DPIA Decision Path
DPIA Content
How Do I Conduct a DPIA?
Signing Off the DPIA
Mitigating Risks Identified by the DPIA
Privacy by Design and Default
External Transfers
Profiling
Pseudonymization
Principles, User Rights, and Obligations
One Stop Shop
Module 4: Structure of the Regulation
Parts of the GDPR
Format of the Articles
Articles
Module 5: Principles and Rights
Introduction
Legality Principle
How the Permissions Work Together?
Lawfulness of Processing Conditions
Lawfulness for Special Categories of Data
Criminal Offence Data
Consent
Transparency Principle
Fairness Principle
Rights of Data Subjects
Purpose Limitation Principle
Minimization Principle
Accuracy Principle
Storage Limitation Principle
Integrity and Confidentiality Principle
Accountability Principle
Module 6: Demonstrating Compliance
Demonstrating Compliance with the GDPR
Impact of Compliance Failure
Administrative Fines
What Influences the Size of an Administrative Fine?
Joint Controllers
Processor Liability Under GDPR
Demonstrating Compliance
Protecting PII is Only Half the Job
What must be Recorded?
Additional Ways of Demonstrating Compliance
Demonstrating a Robust Process
PIMS (Personal Information Management System)
Cyber Essentials
ISO 27017 Code of Practice for Information Security Controls
Risk Management
Module 7: Incident Response and Data Breaches
What is a Personal Data Breach?
Notification Obligations
What Breaches Do I Need to Notify the Relevant Supervisory Authority About?
What Information Must Be Provided to the SA?
How do I Report a Breach to the SA?
Notifying Data Subjects
What Should I do to Prepare for Breach Reporting?
Updating Policies and Procedures
Breach Reporting and Responses
Ways to Minimize the Breach Impact
Module 8: Understanding the Principle Roles
What does the GDPR Makes Businesses Responsible For?
Difference Between a Data Controller and a Data Processor
How the Roles Split?
Controllers and Processors
Main Obligations of Data Controllers
Demonstrate Compliance
Joint Controllers and EU Representative
Controller-Processor Contract
Maintain Records and Keeping Records for Small Businesses
Cooperation with Supervisory Authorities
Keeping PII Secure
Data Breach Transparency
Role of the Data Processor
Controller-Processor Contract
Main Obligations of the Processor
Perform Only the Data Processing Defined by the Data Controller
Update the Data Controller
Sub-Process or Appointment
Keep PII Confidential
Maintaining Records
Cooperate with Supervisory Authorities
Security
Appoint a DPO – If Necessary
Transferring Data Outside the EU
Module 9: Role of the DPO
Role of a Data Protection Officer
Involvement of the DPO
Main Responsibilities of the DPO
Working Environment for the DPO
Must We Have A DPO?
Public Body
What does Large Scale mean?
Systematic Monitoring
Who Can Perform the Role of DPO?
Skills Required
Monitoring Compliance
Training and Awareness
Data Protection Impact Assessments (DPIAs)
Risk-Based Approach
Business Support for the DPO
DPO Independence
DPO – Conflict of Interest
Module 10: UK Implementation
Key Differences Between the Data Protection Act and the GDPR
Highlights from the Data Protection Bill
Definition of Controller
Health, Social Work, Education, and Child Abuse
Age of Consent
Exemptions for Freedom of Expression
Research and Statistics
Archiving in the Public Interest
Module 11: Key Features
Specific Permission
Privacy by Design
Data Portability
Right to be Forgotten
Definitive Consent
Information in Clear Readable Language
Limits on the Use of Profiling
Everyone Follows the Same Law
Adopting Techniques
Module 12: Subject Access Requests and How to Deal with them?
Subject Access Requests (SAR)
Dealing with SAR
Recognize the Request
Understand the Time Limitations
Dealing with Fees and Excessive Requests
Identify, Search, and Gather the Requested Data
Learn about What Information to Withhold
Developing and Sending a Response
Module 13: Data Subject Rights
Must I Always Obey a Right?
Rights and Third Parties
Requests Made on Behalf of Other Data Subjects
Guidelines for Children's Maturity
Responding to a Rights Request
What is a Month?
Rights Request Flow Chart
Right to be Informed
When Should Information Be Provided?
Best Practice Guidance
Right of Access
Right to Rectification
Right to Erasure
When can I Refuse to Comply with a Request for Erasure?
Erasing Children's Data
Right to Restrict Processing
When Processing Should be Restricted?
Protecting PII
Other Issues about Restricting Processing
Right to Data Portability
Right to Object
Complying with the Right to Object
Rejecting the Right to Object
Processing for Direct Marketing Purposes
Processing for Research Purposes
Rights Related to Automated Decision Making and Profiling
When does the Right not apply?
Module 14: Subject Access Requests
Provenance
Overview: SARs
SAR is an Activity, Not a Title
How can a SAR be Submitted?
What Information Should the Response to a SAR Contain?
Additional Information
Replying to a SAR
Confirming a Data Subject’s Identity
Scope
Electronic Records
Non-Electronic Records
SARs Involving 3rd Party PII
Fees
Refusing a Subject Access Request
Access Requests from Employees
Credit Reference Agencies
Best Practice for SARs
Module 15: Lawful Processing
Lawful Processing: A Reminder
User Rights Change Depending on the Justification
Lawfulness of Processing Conditions
Lawfulness for Special Categories of Data
UK ICO Tool
Consent
Key Points About Consent
Affirmative Action and Explicit Consent
Introduction of Affirmative Action
What is Not Affirmative Action?
Examples of Affirmative Action from the ICO
Introduction of Explicit Consent
Explicit Statement
Obtaining Explicit Consent
ICOs View of a Poor Form of Explicit Consent
Obtaining Consent for Scientific Research Purposes
Getting Consent
What Should Go into the Consent Request?
Consent Granularity
Right to Withdraw Consent
Children
Consent Records
ICOs Examples of Record Keeping
Key Points When Establishing Consent
Legitimate Interests
Getting the Balance Right
Consent or Legitimate Interest?
What Lawful Basis Can be Used for Processing Marketing PII?
Module 16: Third Country Data
Cross Border Transfers
Transfer Mechanisms
Derogations
Adequacy
Adequate Ways to Safeguard Transfers of PII
Consent
One-Off or Infrequent Transfers
Who is Responsible?
Transferring PII Between EEA Members
Adequate Countries Outside of the EEA
Binding Corporate Rules (BCR)
What a BCR Must Cover?
Authorization for BCRs
EU-US Privacy Shield
Privacy Shield Overview
Privacy Shield: Mechanics
Model Clauses
Public Authority Agreements
Module 17: Introduction to Protecting Personal Data
Need to Secure
What is Appropriate?
Protecting PII – 3 Key Areas
Coverage
Defensive Design
Single Point of Failure (SPOF)
Incident Response
Data Breach Reporting Requirements
Incident Response Team
Module 18: Data Protection Impact Assessments (DPIA)
Introduction
What Triggers a Data Protection Impact Assessment?
Cases Where DPIA is Not Required
Benefits of DPIA
Processes to be Considered for a DPIA
Responsibilities
DPIA Decision Path
DPIA Content
How Do I Conduct A DPIA?
Signing Off the DPIA
Mitigating Risks Identified by the DPIA
Module 19: Need Want Drop
Overview
Need-Want-Drop: Concept Diagram
Need-Want-Drop: Categorizing Data
Need/Want/Drop Methodology
Module 20: Dealing with Third Parties and Data in the Cloud
What is Cloud Computing?
Myths of Cloud
Cloud Challenges
Controller-Processor Contract
Checklist
Data Controller - Summary
Module 21: Practical Implications: GDPR
Brexit and its Impact on the GDPR
Adequacy
What does this Mean in Practice?
EU and UK Representatives
Exemption Rule
One-Stop Shop
Module 22: Legal Requirements of the GDPR
Lawful, Fair, and Transparent Processing
Limitation of Purpose, Data and Storage
Data Subject Rights
Consent
Personal Data Breaches
Privacy by Design
Data Protection Impact Assessment
Data Transfers
Data Protection Officer
Awareness and Training
Module 23: Privacy Principles in GDPR
Lawfulness, Fairness, and Transparency
Purpose Limitation
Data Minimization
Accuracy
Storage Limitation
Integrity and Confidentiality
Module 24: Common Data Security Failures, Consequences, and Lessons to be Learnt
Common Data Security Failures
Consequences
Fines Relating to Data Breaches
Litigation from Customers Relating to Data Breaches
Directors, Officers, and Professional Advisors
Reputational Damage
Lesson Learned
Knowing When and How to Communicate with Affected Individuals is Not Easy
GDPR is Important, as are Other Legal Frameworks
What’s included in this Certified EU General Data Protection Regulation (EU GDPR) Foundation and Practitioner?
- Expert-led Training Sessions by Certified Instructors
- Comprehensive Course Materials
- Foundation and Practitioner Level GDPR Certification Exam
- Post-training Learner Support
What You’ll Learn in this Course
This course takes you from understanding GDPR principles to applying compliance strategies within an organisation. Each stage builds the knowledge required to implement GDPR with confidence.
Learn the core principles and legal basis of GDPR compliance
Learn how to identify, process, and protect personal data lawfully
Learn to define roles and responsibilities in GDPR governance
Learn how to manage data subject rights and consent frameworks
Learn to apply GDPR security and breach response procedures
Learn how to integrate GDPR into organisational compliance models
EU GDPR Foundation Exam Information
To achieve the Certified EU General Data Protection Regulation (EU GDPR) Practitioner certification, candidates are required to sit for an exam. The format of the exam is as follows:
Question Type: Multiple Choice
Total Questions: 30
Total Marks: 30 Marks
Pass Mark: 57% or 17/30 Marks
Duration: 90 Minutes
Format: Closed Book
Our Upcoming Batches
Mon 1 Dec 2025 - Thu 4 Dec 2025
Duration: 4 Days
Mon 26 Jan 2026 - Thu 29 Jan 2026
Duration: 4 Days
Mon 23 Feb 2026 - Thu 26 Feb 2026
Duration: 4 Days
Mon 30 Mar 2026 - Thu 2 Apr 2026
Duration: 4 Days
Mon 29 Dec 2025 - Thu 1 Jan 2026
Duration: 4 Days Buxton
Fri 2 Jan 2026 - Mon 5 Jan 2026
Duration: 4 Days Buxton
Mon 13 Apr 2026 - Thu 16 Apr 2026
Duration: 4 Days Buxton
Mon 11 May 2026 - Thu 14 May 2026
Duration: 4 Days Buxton
Request More Information
Corporate Training
Elevate your workforce with expert-led corporate training that enhances skills, boosts productivity, and aligns teams with your business goals.
Individuals Training
Unlock personal growth and sharpen professional skills with tailored training designed to build your confidence and career success.
Your Path to Professional Recognition
Our path is designed to guide you through each stage with clarity, support and practical learning, helping you achieve your goals with confidence.
Step Forward with Globally Recognised Certification
A recognised certification is more than a credential. It’s proof of your commitment to professional excellence, providing you with the credibility, confidence, and global reach to advance your career in exciting new directions.
Globally Certified Professionals Over Time
Career Growth
81%Certified professionals reported receiving a promotion after earning their certification.
Global Opportunities
89%Certified professionals experienced access to new career opportunities, including leadership roles and global positions.
Not able to find what you are looking for
Our experts will guide you to the right course from thousands worldwide: tailored to your goals.
Frequently Asked Questions
It is a combined certification program that introduces GDPR fundamentals and progresses into practical compliance implementation for organisations handling personal data.
It helps professionals understand GDPR obligations, reduce compliance risks, and contribute effectively to secure and lawful data practices.
This course is ideal for compliance officers, data protection leads, IT professionals, managers, and anyone involved in handling personal data.
Yes, GDPR applies to sectors including IT, finance, healthcare, retail, government, and any organisation processing personal data.
It equips learners to recognise risk, implement GDPR measures, and support an organisation’s compliance strategy effectively.
What Our Customers Say About Us
Our HR team registered for the Change Management Foundation & Practitioner Training Course, and it couldn’t have been more valuable. The team gained practical frameworks to guide employees smoothly through transitions with confidence.
Our operations staff completed the Lean Six Sigma Green Belt Training Course, and it has been transformative. We can now identify inefficiencies quickly, and the tools we learned are already improving performance across the team.
Our product team took part in the Agile Project Management Foundation & Practitioner (AgilePM®) Training Course, and the difference is remarkable. We’re now more adaptive, collaborative, and efficient in managing change.
Our IT support unit attended the ITIL® 4 Foundation Training Course, and the results have been impressive. Processes are smoother, collaboration has improved, and the team finally speaks a common language of service management.
We joined the PMP® Certification Training Course as a leadership group, and it was outstanding. The trainer made every concept practical, and the exam preparation resources helped the whole team feel ready to tackle complex projects.
Our project office completed the PRINCE2® Foundation & Practitioner Training Course, and it has brought real clarity to how we manage projects. The trainer’s examples were excellent, and the team now follows a structured approach with confidence.