<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/certified-cipp-us" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Certified - CIPP/US Audio Course</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/certified-cipp-us</itunes:new-feed-url>
    <description>The CIPP/US Audio Course is your complete, audio-first companion for mastering the Certified Information Privacy Professional – United States (CIPP/US) certification. Designed for learners who want structured, on-the-go preparation, this Audio Course transforms the IAPP Body of Knowledge into clear, engaging, and easy-to-follow episodes. Each lesson unpacks the foundations of U.S. privacy law—from federal and state frameworks to workplace regulations and cross-border data principles—helping you connect legal theory to real-world application. Whether you’re commuting, exercising, or reviewing between work sessions, this series gives you the structure and clarity to absorb complex legal concepts with confidence and focus.

The CIPP/US certification from the International Association of Privacy Professionals (IAPP) is the gold standard for demonstrating expertise in U.S. privacy law and regulatory compliance. It covers the full spectrum of privacy governance, including laws like HIPAA, GLBA, FCRA, FERPA, and COPPA, as well as enforcement actions, key regulatory agencies, and sector-specific obligations. The certification also explores emerging state laws such as the CCPA and CPRA, illustrating how they align—or conflict—with federal frameworks. Earning the CIPP/US shows that you can navigate the evolving landscape of privacy rights, business obligations, and data protection standards that shape how organizations manage personal information.

Developed by BareMetalCyber.com, the CIPP/US Audio Course provides guided walkthroughs, glossary deep dives, study strategies, and exam insights designed for lasting mastery. Each episode builds your understanding step by step, helping you think like a privacy professional, retain critical details, and approach exam day with confidence and precision.
</description>
    <copyright>@ 2025 Bare Metal Cyber</copyright>
    <podcast:guid>e098a931-7a6e-5cbe-8fea-f7e2f3880da0</podcast:guid>
    <podcast:podroll>
      <podcast:remoteItem feedGuid="12ba6b47-50a9-5caa-aebe-16bae40dbbc5" feedUrl="https://feeds.transistor.fm/cism"/>
      <podcast:remoteItem feedGuid="7e4e319e-3c18-5e46-8d86-9b291b4f2a1a" feedUrl="https://feeds.transistor.fm/certified-comptia-server"/>
      <podcast:remoteItem feedGuid="9af25f2f-f465-5c56-8635-fc5e831ff06a" feedUrl="https://feeds.transistor.fm/bare-metal-cyber-a725a484-8216-4f80-9a32-2bfd5efcc240"/>
      <podcast:remoteItem feedGuid="ac645ca7-7469-50bf-9010-f13c165e3e14" feedUrl="https://feeds.transistor.fm/baremetalcyber-dot-one"/>
      <podcast:remoteItem feedGuid="0e52dc8b-9c94-58c7-b2fc-3041b8d8ca89" feedUrl="https://feeds.transistor.fm/certified-the-isaca-cdpse-audio-course"/>
      <podcast:remoteItem feedGuid="91e17d1e-346e-5831-a7ea-e8f0f42e3d60" feedUrl="https://feeds.transistor.fm/certified-responsible-ai-audio-course"/>
      <podcast:remoteItem feedGuid="0fec92b7-c036-5efc-a042-4ca39a27bfe7" feedUrl="https://feeds.transistor.fm/framework-hitrust"/>
      <podcast:remoteItem feedGuid="6ad73685-a446-5ab3-8b2c-c25af99834f6" feedUrl="https://feeds.transistor.fm/certified-the-security-prepcast"/>
      <podcast:remoteItem feedGuid="c424cfac-04e8-5c02-8ac7-4df13280735d" feedUrl="https://feeds.transistor.fm/certified-the-isaca-cisa-prepcast"/>
      <podcast:remoteItem feedGuid="1e81ed4d-b3a7-5035-b12a-5171bdd497b8" feedUrl="https://feeds.transistor.fm/certified-the-crisc-prepcast"/>
    </podcast:podroll>
    <podcast:locked owner="baremetalcyber@outlook.com">no</podcast:locked>
    <itunes:applepodcastsverify>40c64ef0-8cdb-11f0-832d-4b7628cb83a8</itunes:applepodcastsverify>
    <podcast:trailer pubdate="Mon, 13 Oct 2025 23:23:38 -0500" url="https://media.transistor.fm/60120cb0/a82c7615.mp3" length="4610088" type="audio/mpeg">Welcome to the CIPP/US Certification</podcast:trailer>
    <language>en</language>
    <pubDate>Tue, 21 Apr 2026 21:52:42 -0500</pubDate>
    <lastBuildDate>Fri, 08 May 2026 00:07:03 -0500</lastBuildDate>
    <link>https://baremetalcyber.com/iapp-cippus-audio-course</link>
    <image>
      <url>https://img.transistorcdn.com/bl-HHrUEw_grtv8mxRmiF3u1Ll_0YnRjkOnb_vHlvNQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iMzE3/OWYzODQwNmQyZWEw/YzdiMThlYTIwNGU0/ZjMwMC5wbmc.jpg</url>
      <title>Certified - CIPP/US Audio Course</title>
      <link>https://baremetalcyber.com/iapp-cippus-audio-course</link>
    </image>
    <itunes:category text="Education">
      <itunes:category text="Courses"/>
    </itunes:category>
    <itunes:category text="Technology"/>
    <itunes:type>serial</itunes:type>
    <itunes:author>Jason Edwards</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/bl-HHrUEw_grtv8mxRmiF3u1Ll_0YnRjkOnb_vHlvNQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iMzE3/OWYzODQwNmQyZWEw/YzdiMThlYTIwNGU0/ZjMwMC5wbmc.jpg"/>
    <itunes:summary>The CIPP/US Audio Course is your complete, audio-first companion for mastering the Certified Information Privacy Professional – United States (CIPP/US) certification. Designed for learners who want structured, on-the-go preparation, this Audio Course transforms the IAPP Body of Knowledge into clear, engaging, and easy-to-follow episodes. Each lesson unpacks the foundations of U.S. privacy law—from federal and state frameworks to workplace regulations and cross-border data principles—helping you connect legal theory to real-world application. Whether you’re commuting, exercising, or reviewing between work sessions, this series gives you the structure and clarity to absorb complex legal concepts with confidence and focus.

The CIPP/US certification from the International Association of Privacy Professionals (IAPP) is the gold standard for demonstrating expertise in U.S. privacy law and regulatory compliance. It covers the full spectrum of privacy governance, including laws like HIPAA, GLBA, FCRA, FERPA, and COPPA, as well as enforcement actions, key regulatory agencies, and sector-specific obligations. The certification also explores emerging state laws such as the CCPA and CPRA, illustrating how they align—or conflict—with federal frameworks. Earning the CIPP/US shows that you can navigate the evolving landscape of privacy rights, business obligations, and data protection standards that shape how organizations manage personal information.

Developed by BareMetalCyber.com, the CIPP/US Audio Course provides guided walkthroughs, glossary deep dives, study strategies, and exam insights designed for lasting mastery. Each episode builds your understanding step by step, helping you think like a privacy professional, retain critical details, and approach exam day with confidence and precision.
</itunes:summary>
    <itunes:subtitle>The CIPP/US Audio Course is your complete, audio-first companion for mastering the Certified Information Privacy Professional – United States (CIPP/US) certification.</itunes:subtitle>
    <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
    <itunes:owner>
      <itunes:name>Jason Edwards</itunes:name>
      <itunes:email>baremetalcyber@outlook.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Episode 1 — Exam Orientation: Purpose of the CIPP/US Credential</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Episode 1 — Exam Orientation: Purpose of the CIPP/US Credential</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">86b62908-1fee-4167-8a2f-38cccb7b3736</guid>
      <link>https://share.transistor.fm/s/05653566</link>
      <description>
        <![CDATA[<p>This opening episode introduces you to the Certified Information Privacy Professional/United States credential and why it has become the gold standard for privacy expertise in the U.S. market. We’ll set the context by explaining how the certification validates your knowledge of laws, regulations, and enforcement structures, and why employers, clients, and colleagues recognize it as a meaningful professional benchmark. Beyond simply being a test, the credential reflects a growing demand for specialists who can navigate today’s complex web of federal and state rules, sector-specific obligations, and international overlaps. Understanding this purpose from the outset helps you frame the value of your study journey.</p><p>We also explore how the CIPP/US aligns with the broader IAPP certification framework, positioning you within a global network of privacy professionals. By clarifying the credential’s role in professional development, compliance work, and organizational governance, this orientation builds motivation and direction for the episodes that follow. Rather than approaching your preparation as a box-checking exercise, you’ll see the exam as an investment in credibility and long-term career growth. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This opening episode introduces you to the Certified Information Privacy Professional/United States credential and why it has become the gold standard for privacy expertise in the U.S. market. We’ll set the context by explaining how the certification validates your knowledge of laws, regulations, and enforcement structures, and why employers, clients, and colleagues recognize it as a meaningful professional benchmark. Beyond simply being a test, the credential reflects a growing demand for specialists who can navigate today’s complex web of federal and state rules, sector-specific obligations, and international overlaps. Understanding this purpose from the outset helps you frame the value of your study journey.</p><p>We also explore how the CIPP/US aligns with the broader IAPP certification framework, positioning you within a global network of privacy professionals. By clarifying the credential’s role in professional development, compliance work, and organizational governance, this orientation builds motivation and direction for the episodes that follow. Rather than approaching your preparation as a box-checking exercise, you’ll see the exam as an investment in credibility and long-term career growth. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:07:38 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/05653566/43ae1da1.mp3" length="71801187" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1794</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This opening episode introduces you to the Certified Information Privacy Professional/United States credential and why it has become the gold standard for privacy expertise in the U.S. market. We’ll set the context by explaining how the certification validates your knowledge of laws, regulations, and enforcement structures, and why employers, clients, and colleagues recognize it as a meaningful professional benchmark. Beyond simply being a test, the credential reflects a growing demand for specialists who can navigate today’s complex web of federal and state rules, sector-specific obligations, and international overlaps. Understanding this purpose from the outset helps you frame the value of your study journey.</p><p>We also explore how the CIPP/US aligns with the broader IAPP certification framework, positioning you within a global network of privacy professionals. By clarifying the credential’s role in professional development, compliance work, and organizational governance, this orientation builds motivation and direction for the episodes that follow. Rather than approaching your preparation as a box-checking exercise, you’ll see the exam as an investment in credibility and long-term career growth. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/05653566/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 2 — Study Strategy: Building a Prep Timeline and Pacing Plan</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Episode 2 — Study Strategy: Building a Prep Timeline and Pacing Plan</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f14f28b0-88a8-4ac8-88b6-1d00935b01e5</guid>
      <link>https://share.transistor.fm/s/3397abbf</link>
      <description>
        <![CDATA[<p>Preparation is as much about organization as it is about knowledge. This episode walks you through how to create a structured study timeline that balances your daily commitments with the demands of the CIPP/US Body of Knowledge. We cover how to break down the content into manageable portions, determine the number of hours per week you should realistically allocate, and identify milestones that keep you on track. Special emphasis is placed on pacing—ensuring you neither burn out by overloading yourself early nor fall behind by underestimating the scope of material.</p><p>We’ll also discuss adaptive strategies such as rotating between content-heavy sessions and lighter review days, and how to build a feedback loop using practice questions and mock exams. By the end, you’ll have a repeatable system that minimizes stress, maximizes retention, and aligns with your personal learning style. A strong study plan ensures you approach the exam with both confidence and consistency rather than uncertainty and panic. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Preparation is as much about organization as it is about knowledge. This episode walks you through how to create a structured study timeline that balances your daily commitments with the demands of the CIPP/US Body of Knowledge. We cover how to break down the content into manageable portions, determine the number of hours per week you should realistically allocate, and identify milestones that keep you on track. Special emphasis is placed on pacing—ensuring you neither burn out by overloading yourself early nor fall behind by underestimating the scope of material.</p><p>We’ll also discuss adaptive strategies such as rotating between content-heavy sessions and lighter review days, and how to build a feedback loop using practice questions and mock exams. By the end, you’ll have a repeatable system that minimizes stress, maximizes retention, and aligns with your personal learning style. A strong study plan ensures you approach the exam with both confidence and consistency rather than uncertainty and panic. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:08:02 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3397abbf/83e61430.mp3" length="66261997" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1655</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Preparation is as much about organization as it is about knowledge. This episode walks you through how to create a structured study timeline that balances your daily commitments with the demands of the CIPP/US Body of Knowledge. We cover how to break down the content into manageable portions, determine the number of hours per week you should realistically allocate, and identify milestones that keep you on track. Special emphasis is placed on pacing—ensuring you neither burn out by overloading yourself early nor fall behind by underestimating the scope of material.</p><p>We’ll also discuss adaptive strategies such as rotating between content-heavy sessions and lighter review days, and how to build a feedback loop using practice questions and mock exams. By the end, you’ll have a repeatable system that minimizes stress, maximizes retention, and aligns with your personal learning style. A strong study plan ensures you approach the exam with both confidence and consistency rather than uncertainty and panic. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3397abbf/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 3 — Exam Format &amp; Test Taking Skills: Question Types, Scoring, and Breaks Explained</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Episode 3 — Exam Format &amp; Test Taking Skills: Question Types, Scoring, and Breaks Explained</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4d00b661-e830-4e0b-8ebb-9c970eebe8a1</guid>
      <link>https://share.transistor.fm/s/6d4d065b</link>
      <description>
        <![CDATA[<p>Knowing what to expect on exam day is half the battle. In this episode, we break down the structure of the CIPP/US exam, including the multiple-choice question types, how scenario-based items are framed, and the scoring model used by the IAPP. You’ll learn how the 100–500 scale is determined, why the passing score is set at 300, and how to avoid wasting energy trying to back-calculate percentages. We’ll also cover how the exam incorporates unscored questions and why they matter for future updates.</p><p>Beyond format, we highlight the critical test-taking skills that can raise your score even without deeper subject mastery. These include strategies for pacing, eliminating wrong answers, flagging and revisiting difficult questions, and making the most of the 15-minute break between halves. Practical guidance ensures that exam day feels like a familiar, controlled environment rather than an unpredictable test of endurance. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Knowing what to expect on exam day is half the battle. In this episode, we break down the structure of the CIPP/US exam, including the multiple-choice question types, how scenario-based items are framed, and the scoring model used by the IAPP. You’ll learn how the 100–500 scale is determined, why the passing score is set at 300, and how to avoid wasting energy trying to back-calculate percentages. We’ll also cover how the exam incorporates unscored questions and why they matter for future updates.</p><p>Beyond format, we highlight the critical test-taking skills that can raise your score even without deeper subject mastery. These include strategies for pacing, eliminating wrong answers, flagging and revisiting difficult questions, and making the most of the 15-minute break between halves. Practical guidance ensures that exam day feels like a familiar, controlled environment rather than an unpredictable test of endurance. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:08:33 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6d4d065b/1dbd12bf.mp3" length="69012443" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1724</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Knowing what to expect on exam day is half the battle. In this episode, we break down the structure of the CIPP/US exam, including the multiple-choice question types, how scenario-based items are framed, and the scoring model used by the IAPP. You’ll learn how the 100–500 scale is determined, why the passing score is set at 300, and how to avoid wasting energy trying to back-calculate percentages. We’ll also cover how the exam incorporates unscored questions and why they matter for future updates.</p><p>Beyond format, we highlight the critical test-taking skills that can raise your score even without deeper subject mastery. These include strategies for pacing, eliminating wrong answers, flagging and revisiting difficult questions, and making the most of the 15-minute break between halves. Practical guidance ensures that exam day feels like a familiar, controlled environment rather than an unpredictable test of endurance. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6d4d065b/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 4 — Exam Mindset &amp; Retention Strategy: Flashcards, Audio Learning, and Note Cycles</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Episode 4 — Exam Mindset &amp; Retention Strategy: Flashcards, Audio Learning, and Note Cycles</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0204b7e2-ee68-447b-8c7e-f5113c0de03b</guid>
      <link>https://share.transistor.fm/s/d74ee342</link>
      <description>
        <![CDATA[<p>Memorization alone won’t get you through the CIPP/US exam—you need a strategy for long-term retention. This episode explores proven study methods such as spaced repetition with flashcards, active recall exercises, and audio reinforcement. We’ll discuss how layering these approaches strengthens memory and makes complex statutes and case law easier to recall under pressure. For audio-first learners, you’ll also learn how to convert material into listenable segments that can be replayed during commutes, workouts, or downtime, turning passive time into active review.</p><p>We also examine how to use note-taking cycles to continuously refine and simplify your materials. By iteratively rewriting key points, you reinforce understanding and highlight areas that still need attention. Building these habits early not only improves recall for exam day but also creates a toolkit of methods you can reuse for continuing education and future certifications. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Memorization alone won’t get you through the CIPP/US exam—you need a strategy for long-term retention. This episode explores proven study methods such as spaced repetition with flashcards, active recall exercises, and audio reinforcement. We’ll discuss how layering these approaches strengthens memory and makes complex statutes and case law easier to recall under pressure. For audio-first learners, you’ll also learn how to convert material into listenable segments that can be replayed during commutes, workouts, or downtime, turning passive time into active review.</p><p>We also examine how to use note-taking cycles to continuously refine and simplify your materials. By iteratively rewriting key points, you reinforce understanding and highlight areas that still need attention. Building these habits early not only improves recall for exam day but also creates a toolkit of methods you can reuse for continuing education and future certifications. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:09:05 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d74ee342/57e8bda7.mp3" length="63652761" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1590</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Memorization alone won’t get you through the CIPP/US exam—you need a strategy for long-term retention. This episode explores proven study methods such as spaced repetition with flashcards, active recall exercises, and audio reinforcement. We’ll discuss how layering these approaches strengthens memory and makes complex statutes and case law easier to recall under pressure. For audio-first learners, you’ll also learn how to convert material into listenable segments that can be replayed during commutes, workouts, or downtime, turning passive time into active review.</p><p>We also examine how to use note-taking cycles to continuously refine and simplify your materials. By iteratively rewriting key points, you reinforce understanding and highlight areas that still need attention. Building these habits early not only improves recall for exam day but also creates a toolkit of methods you can reuse for continuing education and future certifications. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d74ee342/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 5 — Glossary Deep Dive: Domains I–II Terms</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Episode 5 — Glossary Deep Dive: Domains I–II Terms</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bd50290b-dd7c-401e-9b98-e6d9e2fc6de5</guid>
      <link>https://share.transistor.fm/s/0b9146b6</link>
      <description>
        <![CDATA[<p>The glossary is more than a list of definitions—it’s a map of the exam’s language. In this first glossary deep dive, we focus on terms from Domains I and II, which cover the U.S. privacy environment and federal sector-specific laws. You’ll learn how core concepts like jurisdiction, preemption, and private right of action appear in multiple contexts, and why recognizing precise definitions can be the difference between two close answer choices. We emphasize how statutory acronyms, agency names, and enforcement mechanisms are likely to be tested.</p><p>By mastering these terms in advance, you’ll reduce cognitive load during the exam itself, since you won’t have to pause to interpret key phrases. Instead, you’ll be able to immediately apply definitions to scenario-based questions. This glossary deep dive builds the foundation for more complex analyses later, ensuring that vocabulary never becomes a barrier to demonstrating your knowledge. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The glossary is more than a list of definitions—it’s a map of the exam’s language. In this first glossary deep dive, we focus on terms from Domains I and II, which cover the U.S. privacy environment and federal sector-specific laws. You’ll learn how core concepts like jurisdiction, preemption, and private right of action appear in multiple contexts, and why recognizing precise definitions can be the difference between two close answer choices. We emphasize how statutory acronyms, agency names, and enforcement mechanisms are likely to be tested.</p><p>By mastering these terms in advance, you’ll reduce cognitive load during the exam itself, since you won’t have to pause to interpret key phrases. Instead, you’ll be able to immediately apply definitions to scenario-based questions. This glossary deep dive builds the foundation for more complex analyses later, ensuring that vocabulary never becomes a barrier to demonstrating your knowledge. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:09:42 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0b9146b6/e428cc05.mp3" length="69499081" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1736</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The glossary is more than a list of definitions—it’s a map of the exam’s language. In this first glossary deep dive, we focus on terms from Domains I and II, which cover the U.S. privacy environment and federal sector-specific laws. You’ll learn how core concepts like jurisdiction, preemption, and private right of action appear in multiple contexts, and why recognizing precise definitions can be the difference between two close answer choices. We emphasize how statutory acronyms, agency names, and enforcement mechanisms are likely to be tested.</p><p>By mastering these terms in advance, you’ll reduce cognitive load during the exam itself, since you won’t have to pause to interpret key phrases. Instead, you’ll be able to immediately apply definitions to scenario-based questions. This glossary deep dive builds the foundation for more complex analyses later, ensuring that vocabulary never becomes a barrier to demonstrating your knowledge. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0b9146b6/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 6 — Glossary Deep Dive: Domains III–IV Terms</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Episode 6 — Glossary Deep Dive: Domains III–IV Terms</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d11856af-0350-41d8-8c47-0cb7e6608b84</guid>
      <link>https://share.transistor.fm/s/6485cc62</link>
      <description>
        <![CDATA[<p>Our second glossary session turns to Domains III and IV, covering government access to private-sector information and workplace privacy. These domains introduce terminology around subpoenas, national security powers, and workplace monitoring practices. You’ll learn the meaning and implications of terms such as ECPA, FISA, and Section 702, along with employment-related concepts like reasonable expectation of privacy and discrimination protections. Understanding these words in their regulatory and practical contexts makes the law far easier to apply.</p><p>We also highlight how many of these terms map directly to landmark cases, enforcement actions, and agency responsibilities. By working through this vocabulary now, you create a framework that helps you analyze more detailed scenarios when they arise later in the course. This approach ensures that government access provisions and workplace privacy rules don’t feel like isolated topics but instead part of a coherent legal system. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Our second glossary session turns to Domains III and IV, covering government access to private-sector information and workplace privacy. These domains introduce terminology around subpoenas, national security powers, and workplace monitoring practices. You’ll learn the meaning and implications of terms such as ECPA, FISA, and Section 702, along with employment-related concepts like reasonable expectation of privacy and discrimination protections. Understanding these words in their regulatory and practical contexts makes the law far easier to apply.</p><p>We also highlight how many of these terms map directly to landmark cases, enforcement actions, and agency responsibilities. By working through this vocabulary now, you create a framework that helps you analyze more detailed scenarios when they arise later in the course. This approach ensures that government access provisions and workplace privacy rules don’t feel like isolated topics but instead part of a coherent legal system. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:10:40 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6485cc62/de0e69f4.mp3" length="59607245" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1489</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Our second glossary session turns to Domains III and IV, covering government access to private-sector information and workplace privacy. These domains introduce terminology around subpoenas, national security powers, and workplace monitoring practices. You’ll learn the meaning and implications of terms such as ECPA, FISA, and Section 702, along with employment-related concepts like reasonable expectation of privacy and discrimination protections. Understanding these words in their regulatory and practical contexts makes the law far easier to apply.</p><p>We also highlight how many of these terms map directly to landmark cases, enforcement actions, and agency responsibilities. By working through this vocabulary now, you create a framework that helps you analyze more detailed scenarios when they arise later in the course. This approach ensures that government access provisions and workplace privacy rules don’t feel like isolated topics but instead part of a coherent legal system. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6485cc62/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 7 — Glossary Deep Dive: Domain V and Cross-Cutting Terms</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Episode 7 — Glossary Deep Dive: Domain V and Cross-Cutting Terms</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">053a6ef8-4a0b-467c-a404-d2dcdf5e18c2</guid>
      <link>https://share.transistor.fm/s/8f72ed49</link>
      <description>
        <![CDATA[<p>The third glossary episode covers Domain V and other cross-cutting terms that frequently surface across multiple sections of the exam. Here we explain concepts such as opt-out rights, cure periods, breach notification triggers, and the mechanics of comprehensive state laws like the CCPA and CPRA. You’ll also encounter terms that link U.S. laws with international frameworks, including Schrems decisions, standard contractual clauses, and the Data Privacy Framework.</p><p>By pulling together vocabulary that spans federal, state, and international domains, this glossary session helps you see patterns and anticipate where questions may overlap. The result is stronger fluency in the exam’s language, making it easier to recognize nuance and avoid confusion on test day. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The third glossary episode covers Domain V and other cross-cutting terms that frequently surface across multiple sections of the exam. Here we explain concepts such as opt-out rights, cure periods, breach notification triggers, and the mechanics of comprehensive state laws like the CCPA and CPRA. You’ll also encounter terms that link U.S. laws with international frameworks, including Schrems decisions, standard contractual clauses, and the Data Privacy Framework.</p><p>By pulling together vocabulary that spans federal, state, and international domains, this glossary session helps you see patterns and anticipate where questions may overlap. The result is stronger fluency in the exam’s language, making it easier to recognize nuance and avoid confusion on test day. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:11:10 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8f72ed49/ce68202b.mp3" length="62655269" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1565</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The third glossary episode covers Domain V and other cross-cutting terms that frequently surface across multiple sections of the exam. Here we explain concepts such as opt-out rights, cure periods, breach notification triggers, and the mechanics of comprehensive state laws like the CCPA and CPRA. You’ll also encounter terms that link U.S. laws with international frameworks, including Schrems decisions, standard contractual clauses, and the Data Privacy Framework.</p><p>By pulling together vocabulary that spans federal, state, and international domains, this glossary session helps you see patterns and anticipate where questions may overlap. The result is stronger fluency in the exam’s language, making it easier to recognize nuance and avoid confusion on test day. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8f72ed49/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 8 — Domain I Overview: Scope, Structure, and Enforcement Themes</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Episode 8 — Domain I Overview: Scope, Structure, and Enforcement Themes</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">17bb2d28-9df4-48d5-9fcd-dcc24dc1b2b9</guid>
      <link>https://share.transistor.fm/s/73dea921</link>
      <description>
        <![CDATA[<p>Domain I introduces the U.S. privacy environment at its broadest level. In this episode, we review how the branches of government shape privacy law, the sources of law that contribute to the framework, and the roles of regulatory authorities such as the FTC, FCC, and HHS. We also explore how accountability models, compliance obligations, and data subject rights are embedded into U.S. privacy management. These foundations serve as anchors for the rest of your study.</p><p>Enforcement is another core theme of Domain I, and we discuss how federal, state, and self-regulatory systems interact. From civil liability to criminal penalties, from DOJ prosecutions to self-regulatory seals, this episode lays out the enforcement landscape you’ll need to master. With this overview in place, you’ll be prepared to dive into the more detailed federal, state, and sector-specific domains that follow. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Domain I introduces the U.S. privacy environment at its broadest level. In this episode, we review how the branches of government shape privacy law, the sources of law that contribute to the framework, and the roles of regulatory authorities such as the FTC, FCC, and HHS. We also explore how accountability models, compliance obligations, and data subject rights are embedded into U.S. privacy management. These foundations serve as anchors for the rest of your study.</p><p>Enforcement is another core theme of Domain I, and we discuss how federal, state, and self-regulatory systems interact. From civil liability to criminal penalties, from DOJ prosecutions to self-regulatory seals, this episode lays out the enforcement landscape you’ll need to master. With this overview in place, you’ll be prepared to dive into the more detailed federal, state, and sector-specific domains that follow. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:11:54 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/73dea921/e69d1339.mp3" length="66346483" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1657</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Domain I introduces the U.S. privacy environment at its broadest level. In this episode, we review how the branches of government shape privacy law, the sources of law that contribute to the framework, and the roles of regulatory authorities such as the FTC, FCC, and HHS. We also explore how accountability models, compliance obligations, and data subject rights are embedded into U.S. privacy management. These foundations serve as anchors for the rest of your study.</p><p>Enforcement is another core theme of Domain I, and we discuss how federal, state, and self-regulatory systems interact. From civil liability to criminal penalties, from DOJ prosecutions to self-regulatory seals, this episode lays out the enforcement landscape you’ll need to master. With this overview in place, you’ll be prepared to dive into the more detailed federal, state, and sector-specific domains that follow. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/73dea921/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 9 — U.S. Legal Framework: Branches of Government and Privacy Roles</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>Episode 9 — U.S. Legal Framework: Branches of Government and Privacy Roles</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0e2c0582-feab-415a-8233-b97e73c565fa</guid>
      <link>https://share.transistor.fm/s/802a5a2d</link>
      <description>
        <![CDATA[<p>This episode examines how the structure of U.S. government influences the development and enforcement of privacy law. We look at the distinct roles of the legislative, executive, and judicial branches, and how statutes, regulations, and case law interact to shape privacy obligations. You’ll also learn how contracts and common law principles add another layer of enforceability, making the U.S. framework highly fragmented but also adaptable.</p><p>We then turn to the agencies that carry out these laws, focusing on their authority and scope. By mapping who does what—from rulemaking to enforcement—you’ll see how the system balances powers across institutions while still leaving significant gaps. This perspective equips you to better analyze exam questions that hinge on knowing which branch or agency holds authority in a given context. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode examines how the structure of U.S. government influences the development and enforcement of privacy law. We look at the distinct roles of the legislative, executive, and judicial branches, and how statutes, regulations, and case law interact to shape privacy obligations. You’ll also learn how contracts and common law principles add another layer of enforceability, making the U.S. framework highly fragmented but also adaptable.</p><p>We then turn to the agencies that carry out these laws, focusing on their authority and scope. By mapping who does what—from rulemaking to enforcement—you’ll see how the system balances powers across institutions while still leaving significant gaps. This perspective equips you to better analyze exam questions that hinge on knowing which branch or agency holds authority in a given context. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:12:36 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/802a5a2d/47e7d635.mp3" length="54864889" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1370</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode examines how the structure of U.S. government influences the development and enforcement of privacy law. We look at the distinct roles of the legislative, executive, and judicial branches, and how statutes, regulations, and case law interact to shape privacy obligations. You’ll also learn how contracts and common law principles add another layer of enforceability, making the U.S. framework highly fragmented but also adaptable.</p><p>We then turn to the agencies that carry out these laws, focusing on their authority and scope. By mapping who does what—from rulemaking to enforcement—you’ll see how the system balances powers across institutions while still leaving significant gaps. This perspective equips you to better analyze exam questions that hinge on knowing which branch or agency holds authority in a given context. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/802a5a2d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 10 — Sources of Law: Constitutions, Statutes, Case Law, and Contracts</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Episode 10 — Sources of Law: Constitutions, Statutes, Case Law, and Contracts</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7b0956d1-e642-45c0-9280-ff35631a3fd6</guid>
      <link>https://share.transistor.fm/s/99a775f4</link>
      <description>
        <![CDATA[<p>Understanding sources of law is critical to mastering the CIPP/US. In this episode, we unpack the U.S. Constitution’s role in privacy, including federal preemption, the Bill of Rights, and state constitutional guarantees. We then cover how statutes like HIPAA, GLBA, and CCPA provide legislative frameworks, while case law refines their application through judicial interpretation. Contracts are also explored as private law instruments that fill gaps in statutory or regulatory regimes.</p><p>By the end, you’ll see how these sources collectively create a patchwork that is both flexible and fragmented. Recognizing the interplay between constitutions, statutes, case law, and contracts prepares you for questions that test not just definitions but also application in real-world privacy scenarios. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Understanding sources of law is critical to mastering the CIPP/US. In this episode, we unpack the U.S. Constitution’s role in privacy, including federal preemption, the Bill of Rights, and state constitutional guarantees. We then cover how statutes like HIPAA, GLBA, and CCPA provide legislative frameworks, while case law refines their application through judicial interpretation. Contracts are also explored as private law instruments that fill gaps in statutory or regulatory regimes.</p><p>By the end, you’ll see how these sources collectively create a patchwork that is both flexible and fragmented. Recognizing the interplay between constitutions, statutes, case law, and contracts prepares you for questions that test not just definitions but also application in real-world privacy scenarios. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:13:07 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/99a775f4/80508f46.mp3" length="61490816" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1536</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Understanding sources of law is critical to mastering the CIPP/US. In this episode, we unpack the U.S. Constitution’s role in privacy, including federal preemption, the Bill of Rights, and state constitutional guarantees. We then cover how statutes like HIPAA, GLBA, and CCPA provide legislative frameworks, while case law refines their application through judicial interpretation. Contracts are also explored as private law instruments that fill gaps in statutory or regulatory regimes.</p><p>By the end, you’ll see how these sources collectively create a patchwork that is both flexible and fragmented. Recognizing the interplay between constitutions, statutes, case law, and contracts prepares you for questions that test not just definitions but also application in real-world privacy scenarios. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/99a775f4/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 11 — Legal Analysis: Jurisdiction, Scope, Preemption, and Private Right of Action</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>Episode 11 — Legal Analysis: Jurisdiction, Scope, Preemption, and Private Right of Action</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">83be4182-c780-41cb-8765-dee596c6572f</guid>
      <link>https://share.transistor.fm/s/ee0bd477</link>
      <description>
        <![CDATA[<p>This episode dives into the analytical tools used to interpret and apply privacy laws. We’ll break down jurisdiction—who has authority over a particular dispute—and how state and federal powers often overlap. Scope is another key concept, determining which organizations, data types, and individuals fall within a law’s reach. Preemption is examined as the legal principle that federal law overrides state law when conflicts occur, a recurring issue in privacy regulation. Finally, we introduce private rights of action, which determine whether individuals can directly sue for violations. Together, these concepts help you understand not just what laws say, but how they function in practice.</p><p>Through examples, we’ll illustrate how courts, agencies, and companies grapple with these doctrines, highlighting why they often form the basis for exam questions. Mastering legal analysis ensures you can interpret scenarios instead of relying solely on memorization. It also provides a foundation for advanced topics such as cross-border enforcement and multinational compliance conflicts later in the course. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode dives into the analytical tools used to interpret and apply privacy laws. We’ll break down jurisdiction—who has authority over a particular dispute—and how state and federal powers often overlap. Scope is another key concept, determining which organizations, data types, and individuals fall within a law’s reach. Preemption is examined as the legal principle that federal law overrides state law when conflicts occur, a recurring issue in privacy regulation. Finally, we introduce private rights of action, which determine whether individuals can directly sue for violations. Together, these concepts help you understand not just what laws say, but how they function in practice.</p><p>Through examples, we’ll illustrate how courts, agencies, and companies grapple with these doctrines, highlighting why they often form the basis for exam questions. Mastering legal analysis ensures you can interpret scenarios instead of relying solely on memorization. It also provides a foundation for advanced topics such as cross-border enforcement and multinational compliance conflicts later in the course. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:13:52 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ee0bd477/40dd5524.mp3" length="61895960" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1546</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode dives into the analytical tools used to interpret and apply privacy laws. We’ll break down jurisdiction—who has authority over a particular dispute—and how state and federal powers often overlap. Scope is another key concept, determining which organizations, data types, and individuals fall within a law’s reach. Preemption is examined as the legal principle that federal law overrides state law when conflicts occur, a recurring issue in privacy regulation. Finally, we introduce private rights of action, which determine whether individuals can directly sue for violations. Together, these concepts help you understand not just what laws say, but how they function in practice.</p><p>Through examples, we’ll illustrate how courts, agencies, and companies grapple with these doctrines, highlighting why they often form the basis for exam questions. Mastering legal analysis ensures you can interpret scenarios instead of relying solely on memorization. It also provides a foundation for advanced topics such as cross-border enforcement and multinational compliance conflicts later in the course. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ee0bd477/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 12 — Regulatory Authorities: FTC, FCC, DoC, HHS, and Banking Regulators</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Episode 12 — Regulatory Authorities: FTC, FCC, DoC, HHS, and Banking Regulators</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e94f777f-7793-4426-9ffb-1a9744388f63</guid>
      <link>https://share.transistor.fm/s/67897b69</link>
      <description>
        <![CDATA[<p>U.S. privacy law cannot be understood without recognizing the regulators that enforce it. This episode surveys the Federal Trade Commission’s broad Section 5 authority, the Federal Communications Commission’s oversight of telecom privacy, and the Department of Commerce’s role in international frameworks like the Data Privacy Framework. The Department of Health and Human Services administers HIPAA and related health privacy rules, while banking regulators such as the Federal Reserve and Comptroller of the Currency enforce financial sector privacy and security requirements.</p><p>We also discuss how state-level regulators, such as attorneys general and insurance commissioners, intersect with federal oversight. Understanding which authority governs which domain is essential for exam success, as many questions hinge on identifying the right regulator. By the end of this episode, you’ll have a clear map of the enforcement landscape and the ability to apply it to practical privacy problems. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>U.S. privacy law cannot be understood without recognizing the regulators that enforce it. This episode surveys the Federal Trade Commission’s broad Section 5 authority, the Federal Communications Commission’s oversight of telecom privacy, and the Department of Commerce’s role in international frameworks like the Data Privacy Framework. The Department of Health and Human Services administers HIPAA and related health privacy rules, while banking regulators such as the Federal Reserve and Comptroller of the Currency enforce financial sector privacy and security requirements.</p><p>We also discuss how state-level regulators, such as attorneys general and insurance commissioners, intersect with federal oversight. Understanding which authority governs which domain is essential for exam success, as many questions hinge on identifying the right regulator. By the end of this episode, you’ll have a clear map of the enforcement landscape and the ability to apply it to practical privacy problems. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:15:08 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/67897b69/f6ed3b71.mp3" length="52351620" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1307</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>U.S. privacy law cannot be understood without recognizing the regulators that enforce it. This episode surveys the Federal Trade Commission’s broad Section 5 authority, the Federal Communications Commission’s oversight of telecom privacy, and the Department of Commerce’s role in international frameworks like the Data Privacy Framework. The Department of Health and Human Services administers HIPAA and related health privacy rules, while banking regulators such as the Federal Reserve and Comptroller of the Currency enforce financial sector privacy and security requirements.</p><p>We also discuss how state-level regulators, such as attorneys general and insurance commissioners, intersect with federal oversight. Understanding which authority governs which domain is essential for exam success, as many questions hinge on identifying the right regulator. By the end of this episode, you’ll have a clear map of the enforcement landscape and the ability to apply it to practical privacy problems. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/67897b69/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 13 — State Oversight: Attorneys General and Insurance Departments</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Episode 13 — State Oversight: Attorneys General and Insurance Departments</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3872f8f3-3f83-4dcc-8a6e-76e800d90d91</guid>
      <link>https://share.transistor.fm/s/db8fa908</link>
      <description>
        <![CDATA[<p>While federal agencies are powerful, state-level enforcement often drives privacy practice in the U.S. This episode highlights the role of state attorneys general, who bring enforcement actions under state privacy laws, consumer protection statutes, and data breach notification acts. We’ll also explore the growing influence of specialized bodies like the California Privacy Protection Agency, which wields authority over the CCPA and CPRA. Insurance departments add another dimension by regulating how sensitive consumer data is handled in financial and health-related contexts.</p><p>This decentralized enforcement structure makes compliance especially challenging, as organizations must navigate variations in rules, standards, and penalties across jurisdictions. We’ll discuss how these state actors complement, and sometimes conflict with, federal agencies. Understanding this web of oversight is critical for analyzing real-world scenarios and exam questions involving overlapping authorities. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>While federal agencies are powerful, state-level enforcement often drives privacy practice in the U.S. This episode highlights the role of state attorneys general, who bring enforcement actions under state privacy laws, consumer protection statutes, and data breach notification acts. We’ll also explore the growing influence of specialized bodies like the California Privacy Protection Agency, which wields authority over the CCPA and CPRA. Insurance departments add another dimension by regulating how sensitive consumer data is handled in financial and health-related contexts.</p><p>This decentralized enforcement structure makes compliance especially challenging, as organizations must navigate variations in rules, standards, and penalties across jurisdictions. We’ll discuss how these state actors complement, and sometimes conflict with, federal agencies. Understanding this web of oversight is critical for analyzing real-world scenarios and exam questions involving overlapping authorities. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:15:45 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/db8fa908/25a43305.mp3" length="54833208" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1369</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>While federal agencies are powerful, state-level enforcement often drives privacy practice in the U.S. This episode highlights the role of state attorneys general, who bring enforcement actions under state privacy laws, consumer protection statutes, and data breach notification acts. We’ll also explore the growing influence of specialized bodies like the California Privacy Protection Agency, which wields authority over the CCPA and CPRA. Insurance departments add another dimension by regulating how sensitive consumer data is handled in financial and health-related contexts.</p><p>This decentralized enforcement structure makes compliance especially challenging, as organizations must navigate variations in rules, standards, and penalties across jurisdictions. We’ll discuss how these state actors complement, and sometimes conflict with, federal agencies. Understanding this web of oversight is critical for analyzing real-world scenarios and exam questions involving overlapping authorities. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/db8fa908/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 14 — Self-Regulatory Models: Industry Codes and Voluntary Frameworks</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Episode 14 — Self-Regulatory Models: Industry Codes and Voluntary Frameworks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">22686bc2-2c37-4683-98bf-f46f6c2b5ed7</guid>
      <link>https://share.transistor.fm/s/9e613591</link>
      <description>
        <![CDATA[<p>Not all privacy enforcement comes from government. This episode introduces self-regulatory models such as industry codes of conduct, seal programs, and voluntary frameworks. Examples include PCI standards in the payments sector, TRUSTe privacy seals, and the role of trade associations in setting best practices. These models often operate in partnership with regulators but also act as competitive differentiators, signaling compliance and responsibility to consumers.</p><p>We’ll also evaluate the limitations of self-regulation, including questions about enforcement, credibility, and conflicts of interest. Understanding where self-regulation succeeds—and where it falls short—provides context for why comprehensive legislation has gained traction at the state level. This knowledge is directly tested on the exam, often through comparative or scenario-based questions. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Not all privacy enforcement comes from government. This episode introduces self-regulatory models such as industry codes of conduct, seal programs, and voluntary frameworks. Examples include PCI standards in the payments sector, TRUSTe privacy seals, and the role of trade associations in setting best practices. These models often operate in partnership with regulators but also act as competitive differentiators, signaling compliance and responsibility to consumers.</p><p>We’ll also evaluate the limitations of self-regulation, including questions about enforcement, credibility, and conflicts of interest. Understanding where self-regulation succeeds—and where it falls short—provides context for why comprehensive legislation has gained traction at the state level. This knowledge is directly tested on the exam, often through comparative or scenario-based questions. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:16:16 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9e613591/18da6938.mp3" length="49733694" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1242</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Not all privacy enforcement comes from government. This episode introduces self-regulatory models such as industry codes of conduct, seal programs, and voluntary frameworks. Examples include PCI standards in the payments sector, TRUSTe privacy seals, and the role of trade associations in setting best practices. These models often operate in partnership with regulators but also act as competitive differentiators, signaling compliance and responsibility to consumers.</p><p>We’ll also evaluate the limitations of self-regulation, including questions about enforcement, credibility, and conflicts of interest. Understanding where self-regulation succeeds—and where it falls short—provides context for why comprehensive legislation has gained traction at the state level. This knowledge is directly tested on the exam, often through comparative or scenario-based questions. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9e613591/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 15 — Enforcement Framework: Civil vs. Criminal Liability in Privacy Law</title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>Episode 15 — Enforcement Framework: Civil vs. Criminal Liability in Privacy Law</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5cd92744-c4c6-430d-ad09-e28ac8f6fda1</guid>
      <link>https://share.transistor.fm/s/7f407e64</link>
      <description>
        <![CDATA[<p>Liability is the heart of enforcement. In this episode, we distinguish between civil liability, such as damages from consumer lawsuits or regulatory penalties, and criminal liability, which may arise from intentional misconduct like fraud or unauthorized access. We explore how negligence, fiduciary duty, and unfair or deceptive acts and practices (UDAP) form the backbone of many civil cases. At the same time, we highlight how criminal enforcement is typically reserved for egregious violations involving intent.</p><p>By understanding these distinctions, you’ll be able to analyze scenarios that hinge on whether a violation is civil, criminal, or both. This framework is vital for exam questions, as it shapes not only penalties but also which regulators or courts are involved. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Liability is the heart of enforcement. In this episode, we distinguish between civil liability, such as damages from consumer lawsuits or regulatory penalties, and criminal liability, which may arise from intentional misconduct like fraud or unauthorized access. We explore how negligence, fiduciary duty, and unfair or deceptive acts and practices (UDAP) form the backbone of many civil cases. At the same time, we highlight how criminal enforcement is typically reserved for egregious violations involving intent.</p><p>By understanding these distinctions, you’ll be able to analyze scenarios that hinge on whether a violation is civil, criminal, or both. This framework is vital for exam questions, as it shapes not only penalties but also which regulators or courts are involved. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:16:50 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7f407e64/7518b42c.mp3" length="54724740" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1367</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Liability is the heart of enforcement. In this episode, we distinguish between civil liability, such as damages from consumer lawsuits or regulatory penalties, and criminal liability, which may arise from intentional misconduct like fraud or unauthorized access. We explore how negligence, fiduciary duty, and unfair or deceptive acts and practices (UDAP) form the backbone of many civil cases. At the same time, we highlight how criminal enforcement is typically reserved for egregious violations involving intent.</p><p>By understanding these distinctions, you’ll be able to analyze scenarios that hinge on whether a violation is civil, criminal, or both. This framework is vital for exam questions, as it shapes not only penalties but also which regulators or courts are involved. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7f407e64/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 16 — Fiduciary Duty: Duties of Care, Loyalty, and Good Faith in Privacy Contexts</title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>Episode 16 — Fiduciary Duty: Duties of Care, Loyalty, and Good Faith in Privacy Contexts</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6d321e8f-c67b-46ef-beb0-e720e742bc76</guid>
      <link>https://share.transistor.fm/s/3cc39bf5</link>
      <description>
        <![CDATA[<p>Fiduciary duty, long established in corporate and financial contexts, is increasingly applied to data stewardship. This episode introduces the three core fiduciary duties: care, loyalty, and good faith. We discuss how these principles require organizations to protect personal data responsibly, avoid conflicts of interest, and act transparently. While not always codified in privacy law, fiduciary concepts influence how regulators and courts evaluate corporate behavior.</p><p>We’ll also look at examples where fiduciary-like duties are explicitly applied, such as in financial services and health care. Understanding these principles prepares you for exam scenarios where ethical responsibility and legal obligation overlap. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Fiduciary duty, long established in corporate and financial contexts, is increasingly applied to data stewardship. This episode introduces the three core fiduciary duties: care, loyalty, and good faith. We discuss how these principles require organizations to protect personal data responsibly, avoid conflicts of interest, and act transparently. While not always codified in privacy law, fiduciary concepts influence how regulators and courts evaluate corporate behavior.</p><p>We’ll also look at examples where fiduciary-like duties are explicitly applied, such as in financial services and health care. Understanding these principles prepares you for exam scenarios where ethical responsibility and legal obligation overlap. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:17:25 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3cc39bf5/ba298e16.mp3" length="56357718" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1408</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Fiduciary duty, long established in corporate and financial contexts, is increasingly applied to data stewardship. This episode introduces the three core fiduciary duties: care, loyalty, and good faith. We discuss how these principles require organizations to protect personal data responsibly, avoid conflicts of interest, and act transparently. While not always codified in privacy law, fiduciary concepts influence how regulators and courts evaluate corporate behavior.</p><p>We’ll also look at examples where fiduciary-like duties are explicitly applied, such as in financial services and health care. Understanding these principles prepares you for exam scenarios where ethical responsibility and legal obligation overlap. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3cc39bf5/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 17 — Negligence and UDAP: Unfair and Deceptive Acts in Enforcement</title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>Episode 17 — Negligence and UDAP: Unfair and Deceptive Acts in Enforcement</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">da8db50d-c04f-4df2-988c-5fb0e0ed858e</guid>
      <link>https://share.transistor.fm/s/fc2920cb</link>
      <description>
        <![CDATA[<p>Negligence and unfair or deceptive acts and practices (UDAP) are core theories of liability in privacy enforcement. This episode explains how negligence involves failure to meet a standard of reasonable care, such as not securing personal data. UDAP, meanwhile, captures misrepresentations or omissions in consumer-facing statements, even if no breach has occurred. Together, these frameworks give regulators and courts powerful tools to hold organizations accountable.</p><p>We’ll review high-profile enforcement actions and settlements that illustrate how negligence and UDAP apply in practice. By mastering these concepts, you’ll gain insight into how regulators frame cases and why organizations prioritize clear disclosures and robust safeguards. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Negligence and unfair or deceptive acts and practices (UDAP) are core theories of liability in privacy enforcement. This episode explains how negligence involves failure to meet a standard of reasonable care, such as not securing personal data. UDAP, meanwhile, captures misrepresentations or omissions in consumer-facing statements, even if no breach has occurred. Together, these frameworks give regulators and courts powerful tools to hold organizations accountable.</p><p>We’ll review high-profile enforcement actions and settlements that illustrate how negligence and UDAP apply in practice. By mastering these concepts, you’ll gain insight into how regulators frame cases and why organizations prioritize clear disclosures and robust safeguards. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:18:01 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/fc2920cb/165e1919.mp3" length="49085690" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1226</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Negligence and unfair or deceptive acts and practices (UDAP) are core theories of liability in privacy enforcement. This episode explains how negligence involves failure to meet a standard of reasonable care, such as not securing personal data. UDAP, meanwhile, captures misrepresentations or omissions in consumer-facing statements, even if no breach has occurred. Together, these frameworks give regulators and courts powerful tools to hold organizations accountable.</p><p>We’ll review high-profile enforcement actions and settlements that illustrate how negligence and UDAP apply in practice. By mastering these concepts, you’ll gain insight into how regulators frame cases and why organizations prioritize clear disclosures and robust safeguards. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fc2920cb/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 18 — Federal and State Enforcement: DOJ, CPPA, and State AGs</title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>Episode 18 — Federal and State Enforcement: DOJ, CPPA, and State AGs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9f28aebc-763c-4d45-9b53-65fade428f6d</guid>
      <link>https://share.transistor.fm/s/962940e6</link>
      <description>
        <![CDATA[<p>This episode focuses on the interplay of federal and state enforcement bodies. We begin with the Department of Justice, which prosecutes criminal violations and litigates civil cases on behalf of federal agencies. We then turn to state actors such as the California Privacy Protection Agency and attorneys general, who often lead privacy investigations and lawsuits. These layers of enforcement create a patchwork system where companies must answer to multiple authorities simultaneously.</p><p>By the end, you’ll understand how enforcement priorities differ between federal and state bodies, and how coordination—or conflict—shapes outcomes. This perspective will help you navigate exam questions that present overlapping enforcement scenarios. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on the interplay of federal and state enforcement bodies. We begin with the Department of Justice, which prosecutes criminal violations and litigates civil cases on behalf of federal agencies. We then turn to state actors such as the California Privacy Protection Agency and attorneys general, who often lead privacy investigations and lawsuits. These layers of enforcement create a patchwork system where companies must answer to multiple authorities simultaneously.</p><p>By the end, you’ll understand how enforcement priorities differ between federal and state bodies, and how coordination—or conflict—shapes outcomes. This perspective will help you navigate exam questions that present overlapping enforcement scenarios. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:18:38 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/962940e6/d9833aea.mp3" length="50087918" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1251</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on the interplay of federal and state enforcement bodies. We begin with the Department of Justice, which prosecutes criminal violations and litigates civil cases on behalf of federal agencies. We then turn to state actors such as the California Privacy Protection Agency and attorneys general, who often lead privacy investigations and lawsuits. These layers of enforcement create a patchwork system where companies must answer to multiple authorities simultaneously.</p><p>By the end, you’ll understand how enforcement priorities differ between federal and state bodies, and how coordination—or conflict—shapes outcomes. This perspective will help you navigate exam questions that present overlapping enforcement scenarios. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/962940e6/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 19 — Cross-Border Enforcement: GPEN and International Cooperation</title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>Episode 19 — Cross-Border Enforcement: GPEN and International Cooperation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">131bc33b-073e-407a-b75d-686f8a8cc33e</guid>
      <link>https://share.transistor.fm/s/8423d1a2</link>
      <description>
        <![CDATA[<p>Privacy enforcement is increasingly global. This episode introduces the Global Privacy Enforcement Network (GPEN), a collaboration of regulators worldwide who share information and coordinate investigations. We’ll explore how cross-border cooperation arises in cases involving multinational companies, data transfers, or online services with global reach.</p><p>We also highlight the challenges of aligning different legal systems, enforcement priorities, and remedies. Understanding how international cooperation works prepares you for exam questions that reference cross-border investigations and compliance conflicts. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Privacy enforcement is increasingly global. This episode introduces the Global Privacy Enforcement Network (GPEN), a collaboration of regulators worldwide who share information and coordinate investigations. We’ll explore how cross-border cooperation arises in cases involving multinational companies, data transfers, or online services with global reach.</p><p>We also highlight the challenges of aligning different legal systems, enforcement priorities, and remedies. Understanding how international cooperation works prepares you for exam questions that reference cross-border investigations and compliance conflicts. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:19:09 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8423d1a2/b0e28fad.mp3" length="69911928" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1746</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Privacy enforcement is increasingly global. This episode introduces the Global Privacy Enforcement Network (GPEN), a collaboration of regulators worldwide who share information and coordinate investigations. We’ll explore how cross-border cooperation arises in cases involving multinational companies, data transfers, or online services with global reach.</p><p>We also highlight the challenges of aligning different legal systems, enforcement priorities, and remedies. Understanding how international cooperation works prepares you for exam questions that reference cross-border investigations and compliance conflicts. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8423d1a2/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 20 — Self-Regulatory Enforcement: PCI, Trust Marks, and Seal Programs</title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>Episode 20 — Self-Regulatory Enforcement: PCI, Trust Marks, and Seal Programs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6f6ede20-1d32-4e7a-a903-abdd5397de52</guid>
      <link>https://share.transistor.fm/s/7aaabd95</link>
      <description>
        <![CDATA[<p>Building on our earlier discussion of self-regulation, this episode focuses specifically on enforcement mechanisms. We’ll look at how programs such as the Payment Card Industry Data Security Standard (PCI DSS) enforce compliance through contractual obligations, and how privacy seals or trust marks maintain credibility through audits and monitoring. While not legally binding, these mechanisms often carry significant commercial weight, influencing consumer trust and partner relationships.</p><p>We’ll also discuss how regulators view these programs and how they sometimes integrate with formal enforcement actions. By understanding self-regulatory enforcement, you’ll be able to analyze scenarios where compliance is enforced outside the courtroom. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Building on our earlier discussion of self-regulation, this episode focuses specifically on enforcement mechanisms. We’ll look at how programs such as the Payment Card Industry Data Security Standard (PCI DSS) enforce compliance through contractual obligations, and how privacy seals or trust marks maintain credibility through audits and monitoring. While not legally binding, these mechanisms often carry significant commercial weight, influencing consumer trust and partner relationships.</p><p>We’ll also discuss how regulators view these programs and how they sometimes integrate with formal enforcement actions. By understanding self-regulatory enforcement, you’ll be able to analyze scenarios where compliance is enforced outside the courtroom. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:19:38 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7aaabd95/18e6c093.mp3" length="55582016" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1388</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Building on our earlier discussion of self-regulation, this episode focuses specifically on enforcement mechanisms. We’ll look at how programs such as the Payment Card Industry Data Security Standard (PCI DSS) enforce compliance through contractual obligations, and how privacy seals or trust marks maintain credibility through audits and monitoring. While not legally binding, these mechanisms often carry significant commercial weight, influencing consumer trust and partner relationships.</p><p>We’ll also discuss how regulators view these programs and how they sometimes integrate with formal enforcement actions. By understanding self-regulatory enforcement, you’ll be able to analyze scenarios where compliance is enforced outside the courtroom. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7aaabd95/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 21 — Information Management: Data Inventory and Classification Practices</title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>Episode 21 — Information Management: Data Inventory and Classification Practices</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8a04ea42-5974-4853-b1fd-e5722169f3c9</guid>
      <link>https://share.transistor.fm/s/57541efc</link>
      <description>
        <![CDATA[<p>Strong privacy programs begin with knowing what data you have. This episode covers how organizations build and maintain a data inventory, cataloging personal information across systems, applications, and vendors. We’ll explore how classification frameworks distinguish between sensitive and non-sensitive categories, and why these distinctions matter for regulatory compliance, contractual obligations, and internal risk management. Without clear visibility, organizations cannot fulfill obligations like data subject requests or apply retention and deletion policies effectively.</p><p>We also highlight the operational benefits of inventories, including streamlined security controls and improved vendor oversight. By grounding privacy management in structured data practices, organizations reduce blind spots and improve accountability. These concepts appear throughout the CIPP/US exam, making them essential for your preparation. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Strong privacy programs begin with knowing what data you have. This episode covers how organizations build and maintain a data inventory, cataloging personal information across systems, applications, and vendors. We’ll explore how classification frameworks distinguish between sensitive and non-sensitive categories, and why these distinctions matter for regulatory compliance, contractual obligations, and internal risk management. Without clear visibility, organizations cannot fulfill obligations like data subject requests or apply retention and deletion policies effectively.</p><p>We also highlight the operational benefits of inventories, including streamlined security controls and improved vendor oversight. By grounding privacy management in structured data practices, organizations reduce blind spots and improve accountability. These concepts appear throughout the CIPP/US exam, making them essential for your preparation. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:20:10 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/57541efc/b9b4390b.mp3" length="60996422" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1524</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Strong privacy programs begin with knowing what data you have. This episode covers how organizations build and maintain a data inventory, cataloging personal information across systems, applications, and vendors. We’ll explore how classification frameworks distinguish between sensitive and non-sensitive categories, and why these distinctions matter for regulatory compliance, contractual obligations, and internal risk management. Without clear visibility, organizations cannot fulfill obligations like data subject requests or apply retention and deletion policies effectively.</p><p>We also highlight the operational benefits of inventories, including streamlined security controls and improved vendor oversight. By grounding privacy management in structured data practices, organizations reduce blind spots and improve accountability. These concepts appear throughout the CIPP/US exam, making them essential for your preparation. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/57541efc/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 22 — Data Flow Mapping: Transfers, Sharing, and Accountability Controls</title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>Episode 22 — Data Flow Mapping: Transfers, Sharing, and Accountability Controls</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d9e6d638-4312-40b0-a682-1cfc700eaba3</guid>
      <link>https://share.transistor.fm/s/a9bc38cb</link>
      <description>
        <![CDATA[<p>Data doesn’t stay put—it flows across systems, organizations, and borders. This episode explains how to map those flows, identify points of transfer, and implement controls that ensure compliance. We’ll discuss intra-organizational transfers, such as between departments or subsidiaries, and external flows to vendors, partners, or regulators. Accountability mechanisms, such as contractual clauses and data processing agreements, form the backbone of lawful transfers.</p><p>We’ll also examine how flow mapping supports transparency obligations, enabling organizations to explain where data goes and why. For exam purposes, expect questions on the mechanics of accountability controls, including contracts, due diligence, and oversight mechanisms. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Data doesn’t stay put—it flows across systems, organizations, and borders. This episode explains how to map those flows, identify points of transfer, and implement controls that ensure compliance. We’ll discuss intra-organizational transfers, such as between departments or subsidiaries, and external flows to vendors, partners, or regulators. Accountability mechanisms, such as contractual clauses and data processing agreements, form the backbone of lawful transfers.</p><p>We’ll also examine how flow mapping supports transparency obligations, enabling organizations to explain where data goes and why. For exam purposes, expect questions on the mechanics of accountability controls, including contracts, due diligence, and oversight mechanisms. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:20:40 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a9bc38cb/d1826ec8.mp3" length="58103940" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1451</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Data doesn’t stay put—it flows across systems, organizations, and borders. This episode explains how to map those flows, identify points of transfer, and implement controls that ensure compliance. We’ll discuss intra-organizational transfers, such as between departments or subsidiaries, and external flows to vendors, partners, or regulators. Accountability mechanisms, such as contractual clauses and data processing agreements, form the backbone of lawful transfers.</p><p>We’ll also examine how flow mapping supports transparency obligations, enabling organizations to explain where data goes and why. For exam purposes, expect questions on the mechanics of accountability controls, including contracts, due diligence, and oversight mechanisms. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a9bc38cb/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 23 — Privacy Program Development: Workforce Training and Vendor Management</title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>Episode 23 — Privacy Program Development: Workforce Training and Vendor Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5244d1b8-b3a8-4506-a4ca-da00fc65f4f0</guid>
      <link>https://share.transistor.fm/s/aca93ea2</link>
      <description>
        <![CDATA[<p>Building a privacy program is more than drafting policies—it requires embedding privacy into operations. In this episode, we cover workforce training, including how to tailor content for different roles and ensure employees understand their responsibilities. Vendor management is another core element, requiring organizations to assess risks, negotiate processing agreements, and monitor compliance. Together, these practices create the operational backbone of privacy governance.</p><p>We’ll also discuss program maturity, showing how organizations evolve from reactive compliance to proactive risk management. Exam questions may test your ability to identify which elements belong in a privacy program and how they reinforce accountability. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Building a privacy program is more than drafting policies—it requires embedding privacy into operations. In this episode, we cover workforce training, including how to tailor content for different roles and ensure employees understand their responsibilities. Vendor management is another core element, requiring organizations to assess risks, negotiate processing agreements, and monitor compliance. Together, these practices create the operational backbone of privacy governance.</p><p>We’ll also discuss program maturity, showing how organizations evolve from reactive compliance to proactive risk management. Exam questions may test your ability to identify which elements belong in a privacy program and how they reinforce accountability. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:21:36 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/aca93ea2/fd59d51e.mp3" length="74938506" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1872</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Building a privacy program is more than drafting policies—it requires embedding privacy into operations. In this episode, we cover workforce training, including how to tailor content for different roles and ensure employees understand their responsibilities. Vendor management is another core element, requiring organizations to assess risks, negotiate processing agreements, and monitor compliance. Together, these practices create the operational backbone of privacy governance.</p><p>We’ll also discuss program maturity, showing how organizations evolve from reactive compliance to proactive risk management. Exam questions may test your ability to identify which elements belong in a privacy program and how they reinforce accountability. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/aca93ea2/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 24 — Cloud and Third-Party Sharing: Processing Agreements and Due Diligence</title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>Episode 24 — Cloud and Third-Party Sharing: Processing Agreements and Due Diligence</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bde49002-d6ed-4b7c-8450-fafb9c1df8fc</guid>
      <link>https://share.transistor.fm/s/dcdb5888</link>
      <description>
        <![CDATA[<p>Cloud services and third-party vendors introduce unique privacy challenges. This episode examines how processing agreements define roles and responsibilities between controllers and processors, including clauses on security, breach notification, and sub-processing. Due diligence processes—such as audits, questionnaires, and certifications—help ensure vendors meet contractual and regulatory requirements.</p><p>We’ll also explore how cloud environments complicate data flows, requiring clear accountability for shared infrastructure. Understanding these agreements is essential for both compliance and exam preparation, as scenarios often hinge on distinguishing responsibilities across different parties. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Cloud services and third-party vendors introduce unique privacy challenges. This episode examines how processing agreements define roles and responsibilities between controllers and processors, including clauses on security, breach notification, and sub-processing. Due diligence processes—such as audits, questionnaires, and certifications—help ensure vendors meet contractual and regulatory requirements.</p><p>We’ll also explore how cloud environments complicate data flows, requiring clear accountability for shared infrastructure. Understanding these agreements is essential for both compliance and exam preparation, as scenarios often hinge on distinguishing responsibilities across different parties. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:22:23 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/dcdb5888/ef618631.mp3" length="71978828" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1798</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Cloud services and third-party vendors introduce unique privacy challenges. This episode examines how processing agreements define roles and responsibilities between controllers and processors, including clauses on security, breach notification, and sub-processing. Due diligence processes—such as audits, questionnaires, and certifications—help ensure vendors meet contractual and regulatory requirements.</p><p>We’ll also explore how cloud environments complicate data flows, requiring clear accountability for shared infrastructure. Understanding these agreements is essential for both compliance and exam preparation, as scenarios often hinge on distinguishing responsibilities across different parties. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/dcdb5888/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 25 — Incident Response Programs: Ransomware and Vendor Incidents</title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>Episode 25 — Incident Response Programs: Ransomware and Vendor Incidents</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">19f1c916-1ad7-4a4e-9671-a69b2442d3a1</guid>
      <link>https://share.transistor.fm/s/d5d6ed2a</link>
      <description>
        <![CDATA[<p>Privacy law intersects with cybersecurity when incidents occur. This episode explains how organizations build incident response programs to address threats like ransomware, data breaches, and vendor security failures. We’ll cover the steps of detection, containment, investigation, notification, and remediation, highlighting where privacy law imposes specific obligations.</p><p>We also look at how regulators evaluate incident response, from timeliness of notifications to adequacy of corrective measures. Exam questions frequently involve breach scenarios, so mastering this process is key to analyzing legal duties under federal and state frameworks. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Privacy law intersects with cybersecurity when incidents occur. This episode explains how organizations build incident response programs to address threats like ransomware, data breaches, and vendor security failures. We’ll cover the steps of detection, containment, investigation, notification, and remediation, highlighting where privacy law imposes specific obligations.</p><p>We also look at how regulators evaluate incident response, from timeliness of notifications to adequacy of corrective measures. Exam questions frequently involve breach scenarios, so mastering this process is key to analyzing legal duties under federal and state frameworks. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 20:22:53 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d5d6ed2a/76f26104.mp3" length="75821686" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1894</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Privacy law intersects with cybersecurity when incidents occur. This episode explains how organizations build incident response programs to address threats like ransomware, data breaches, and vendor security failures. We’ll cover the steps of detection, containment, investigation, notification, and remediation, highlighting where privacy law imposes specific obligations.</p><p>We also look at how regulators evaluate incident response, from timeliness of notifications to adequacy of corrective measures. Exam questions frequently involve breach scenarios, so mastering this process is key to analyzing legal duties under federal and state frameworks. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d5d6ed2a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 26 — Accountability Models: Demonstrating Compliance and Due Diligence</title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>Episode 26 — Accountability Models: Demonstrating Compliance and Due Diligence</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8ae8fe14-0a9e-4e53-8b9c-35fb4d0b988c</guid>
      <link>https://share.transistor.fm/s/a1a3c212</link>
      <description>
        <![CDATA[<p>Accountability is the thread connecting all privacy obligations. In this episode, we define accountability models as frameworks for demonstrating compliance through documentation, assessments, and governance structures. Examples include risk assessments, data protection impact assessments, and ongoing monitoring. These models serve as proof that an organization has taken reasonable steps to protect personal data.</p><p>We’ll also discuss the exam-relevant principle that accountability is proactive, not reactive. Demonstrating due diligence before an incident or complaint occurs is what regulators and courts expect. Understanding this mindset prepares you to answer scenario-based questions with confidence. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Accountability is the thread connecting all privacy obligations. In this episode, we define accountability models as frameworks for demonstrating compliance through documentation, assessments, and governance structures. Examples include risk assessments, data protection impact assessments, and ongoing monitoring. These models serve as proof that an organization has taken reasonable steps to protect personal data.</p><p>We’ll also discuss the exam-relevant principle that accountability is proactive, not reactive. Demonstrating due diligence before an incident or complaint occurs is what regulators and courts expect. Understanding this mindset prepares you to answer scenario-based questions with confidence. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:06:41 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a1a3c212/42b61297.mp3" length="70632898" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1764</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Accountability is the thread connecting all privacy obligations. In this episode, we define accountability models as frameworks for demonstrating compliance through documentation, assessments, and governance structures. Examples include risk assessments, data protection impact assessments, and ongoing monitoring. These models serve as proof that an organization has taken reasonable steps to protect personal data.</p><p>We’ll also discuss the exam-relevant principle that accountability is proactive, not reactive. Demonstrating due diligence before an incident or complaint occurs is what regulators and courts expect. Understanding this mindset prepares you to answer scenario-based questions with confidence. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a1a3c212/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 27 — Data Retention and Disposal: Lifecycle, Archiving, and Legal Holds</title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>Episode 27 — Data Retention and Disposal: Lifecycle, Archiving, and Legal Holds</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">249041ba-0b26-4544-b12d-80bf9d928b42</guid>
      <link>https://share.transistor.fm/s/6f2ba8b9</link>
      <description>
        <![CDATA[<p>Data has a lifecycle, and managing it responsibly is critical for privacy compliance. This episode covers retention schedules that specify how long data must be kept, archival practices for historical or legal purposes, and secure disposal methods to prevent unauthorized access. We also explore the role of legal holds, which suspend deletion when litigation or investigations are pending.</p><p>Balancing retention requirements with minimization principles is a recurring challenge in privacy practice. By understanding how these rules intersect, you’ll be better prepared for exam questions that test your ability to apply both compliance and operational considerations. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Data has a lifecycle, and managing it responsibly is critical for privacy compliance. This episode covers retention schedules that specify how long data must be kept, archival practices for historical or legal purposes, and secure disposal methods to prevent unauthorized access. We also explore the role of legal holds, which suspend deletion when litigation or investigations are pending.</p><p>Balancing retention requirements with minimization principles is a recurring challenge in privacy practice. By understanding how these rules intersect, you’ll be better prepared for exam questions that test your ability to apply both compliance and operational considerations. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:07:26 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6f2ba8b9/0d9c619d.mp3" length="70766340" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1768</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Data has a lifecycle, and managing it responsibly is critical for privacy compliance. This episode covers retention schedules that specify how long data must be kept, archival practices for historical or legal purposes, and secure disposal methods to prevent unauthorized access. We also explore the role of legal holds, which suspend deletion when litigation or investigations are pending.</p><p>Balancing retention requirements with minimization principles is a recurring challenge in privacy practice. By understanding how these rules intersect, you’ll be better prepared for exam questions that test your ability to apply both compliance and operational considerations. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6f2ba8b9/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 28 — Online Privacy: Tracking, Profiling, and Consumer Expectations</title>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>Episode 28 — Online Privacy: Tracking, Profiling, and Consumer Expectations</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a5a6f34d-6e86-4807-987a-8cadd83c095a</guid>
      <link>https://share.transistor.fm/s/ab07b83a</link>
      <description>
        <![CDATA[<p>The online environment presents unique privacy risks. This episode examines how tracking technologies, behavioral profiling, and targeted advertising shape consumer experiences and regulatory responses. We’ll explore how cookies, pixels, and mobile identifiers operate, and why transparency and consent requirements are central to online privacy frameworks.</p><p>We also discuss how consumer expectations often outpace legal requirements, leading to reputational risks even when practices are technically compliant. Exam scenarios frequently draw on online privacy issues, making this a high-value area for focused study. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The online environment presents unique privacy risks. This episode examines how tracking technologies, behavioral profiling, and targeted advertising shape consumer experiences and regulatory responses. We’ll explore how cookies, pixels, and mobile identifiers operate, and why transparency and consent requirements are central to online privacy frameworks.</p><p>We also discuss how consumer expectations often outpace legal requirements, leading to reputational risks even when practices are technically compliant. Exam scenarios frequently draw on online privacy issues, making this a high-value area for focused study. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:08:04 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ab07b83a/b2097b76.mp3" length="72898492" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1821</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The online environment presents unique privacy risks. This episode examines how tracking technologies, behavioral profiling, and targeted advertising shape consumer experiences and regulatory responses. We’ll explore how cookies, pixels, and mobile identifiers operate, and why transparency and consent requirements are central to online privacy frameworks.</p><p>We also discuss how consumer expectations often outpace legal requirements, leading to reputational risks even when practices are technically compliant. Exam scenarios frequently draw on online privacy issues, making this a high-value area for focused study. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ab07b83a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 29 — International Transfers: Schrems, SCCs, and Data Privacy Framework</title>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>Episode 29 — International Transfers: Schrems, SCCs, and Data Privacy Framework</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">23eab4ef-6cd9-4bdc-888b-bb219cd61461</guid>
      <link>https://share.transistor.fm/s/f70a9d8e</link>
      <description>
        <![CDATA[<p>U.S. companies regularly transfer data across borders, triggering international privacy obligations. This episode introduces the Schrems cases, which invalidated earlier EU-U.S. transfer mechanisms, and explains how Standard Contractual Clauses (SCCs) remain a cornerstone of compliance. We also cover the EU-U.S. Data Privacy Framework, designed to restore lawful transfer channels under stricter safeguards.</p><p>By mastering these mechanisms, you’ll understand how multinational organizations maintain compliance despite shifting legal landscapes. Expect exam questions that reference Schrems, SCCs, or adequacy determinations directly. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>U.S. companies regularly transfer data across borders, triggering international privacy obligations. This episode introduces the Schrems cases, which invalidated earlier EU-U.S. transfer mechanisms, and explains how Standard Contractual Clauses (SCCs) remain a cornerstone of compliance. We also cover the EU-U.S. Data Privacy Framework, designed to restore lawful transfer channels under stricter safeguards.</p><p>By mastering these mechanisms, you’ll understand how multinational organizations maintain compliance despite shifting legal landscapes. Expect exam questions that reference Schrems, SCCs, or adequacy determinations directly. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:08:37 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f70a9d8e/4f1b2489.mp3" length="69503940" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1736</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>U.S. companies regularly transfer data across borders, triggering international privacy obligations. This episode introduces the Schrems cases, which invalidated earlier EU-U.S. transfer mechanisms, and explains how Standard Contractual Clauses (SCCs) remain a cornerstone of compliance. We also cover the EU-U.S. Data Privacy Framework, designed to restore lawful transfer channels under stricter safeguards.</p><p>By mastering these mechanisms, you’ll understand how multinational organizations maintain compliance despite shifting legal landscapes. Expect exam questions that reference Schrems, SCCs, or adequacy determinations directly. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f70a9d8e/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 30 — Multinational Conflicts: E-Discovery vs. EU Data Protection</title>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>Episode 30 — Multinational Conflicts: E-Discovery vs. EU Data Protection</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cb4e19e8-e1e7-45fe-ba5e-241bed95166b</guid>
      <link>https://share.transistor.fm/s/bdaf3a35</link>
      <description>
        <![CDATA[<p>Privacy law collides with other legal obligations when organizations face multinational conflicts. This episode highlights the tension between U.S. e-discovery requirements in litigation and EU data protection laws that restrict data transfers. Companies must navigate competing demands, often under tight timelines, while minimizing the risk of penalties from either jurisdiction.</p><p>We’ll discuss real-world strategies, such as anonymization, protective orders, and negotiated cross-border agreements. For the exam, this topic reinforces how conflicts are analyzed and resolved, making it a crucial part of your knowledge base. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Privacy law collides with other legal obligations when organizations face multinational conflicts. This episode highlights the tension between U.S. e-discovery requirements in litigation and EU data protection laws that restrict data transfers. Companies must navigate competing demands, often under tight timelines, while minimizing the risk of penalties from either jurisdiction.</p><p>We’ll discuss real-world strategies, such as anonymization, protective orders, and negotiated cross-border agreements. For the exam, this topic reinforces how conflicts are analyzed and resolved, making it a crucial part of your knowledge base. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:09:12 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/bdaf3a35/65476702.mp3" length="66850486" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1670</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Privacy law collides with other legal obligations when organizations face multinational conflicts. This episode highlights the tension between U.S. e-discovery requirements in litigation and EU data protection laws that restrict data transfers. Companies must navigate competing demands, often under tight timelines, while minimizing the risk of penalties from either jurisdiction.</p><p>We’ll discuss real-world strategies, such as anonymization, protective orders, and negotiated cross-border agreements. For the exam, this topic reinforces how conflicts are analyzed and resolved, making it a crucial part of your knowledge base. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bdaf3a35/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 31 — Comparative Analysis: U.S. Privacy vs. GDPR and FADP</title>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>Episode 31 — Comparative Analysis: U.S. Privacy vs. GDPR and FADP</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dc76413a-b195-4590-b506-1467a35339aa</guid>
      <link>https://share.transistor.fm/s/9aaec648</link>
      <description>
        <![CDATA[<p>This episode explores how U.S. privacy frameworks compare to the European Union’s General Data Protection Regulation (GDPR) and Switzerland’s Federal Act on Data Protection (FADP). We’ll review differences in scope, enforcement powers, and individual rights. While U.S. privacy law is fragmented across federal and state systems, GDPR and FADP establish comprehensive regimes that apply broadly across industries. We also highlight common principles such as purpose limitation, proportionality, and security safeguards that appear in both systems.</p><p>The comparison underscores why multinational organizations must navigate overlapping obligations and harmonize compliance efforts. For exam purposes, you should be prepared to identify points of convergence and divergence across regimes. This knowledge helps you analyze scenarios involving cross-border transfers, multinational conflicts, or vendor oversight. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explores how U.S. privacy frameworks compare to the European Union’s General Data Protection Regulation (GDPR) and Switzerland’s Federal Act on Data Protection (FADP). We’ll review differences in scope, enforcement powers, and individual rights. While U.S. privacy law is fragmented across federal and state systems, GDPR and FADP establish comprehensive regimes that apply broadly across industries. We also highlight common principles such as purpose limitation, proportionality, and security safeguards that appear in both systems.</p><p>The comparison underscores why multinational organizations must navigate overlapping obligations and harmonize compliance efforts. For exam purposes, you should be prepared to identify points of convergence and divergence across regimes. This knowledge helps you analyze scenarios involving cross-border transfers, multinational conflicts, or vendor oversight. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:09:48 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9aaec648/832b8f74.mp3" length="65055272" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1625</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explores how U.S. privacy frameworks compare to the European Union’s General Data Protection Regulation (GDPR) and Switzerland’s Federal Act on Data Protection (FADP). We’ll review differences in scope, enforcement powers, and individual rights. While U.S. privacy law is fragmented across federal and state systems, GDPR and FADP establish comprehensive regimes that apply broadly across industries. We also highlight common principles such as purpose limitation, proportionality, and security safeguards that appear in both systems.</p><p>The comparison underscores why multinational organizations must navigate overlapping obligations and harmonize compliance efforts. For exam purposes, you should be prepared to identify points of convergence and divergence across regimes. This knowledge helps you analyze scenarios involving cross-border transfers, multinational conflicts, or vendor oversight. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9aaec648/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 32 — Domain II Overview: Federal vs. State Sector-Specific Frameworks</title>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>Episode 32 — Domain II Overview: Federal vs. State Sector-Specific Frameworks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">22432b5c-73c0-4f8a-9710-0d91c75027c2</guid>
      <link>https://share.transistor.fm/s/f1c32f5c</link>
      <description>
        <![CDATA[<p>Domain II focuses on federal and state laws governing specific sectors such as health, finance, education, and telecommunications. This episode introduces the federal “sectoral” approach, where distinct statutes regulate different industries rather than one overarching law. We contrast this with state-level frameworks that increasingly take comprehensive approaches, such as California’s CCPA and CPRA. By examining this domain, you’ll learn how overlapping systems create both compliance challenges and exam scenarios that require careful analysis.</p><p>We also explain why sector-specific laws remain central to the U.S. model, highlighting how they coexist with newer state laws. Understanding this layered structure ensures you can navigate questions about scope, exemptions, and enforcement in different contexts. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Domain II focuses on federal and state laws governing specific sectors such as health, finance, education, and telecommunications. This episode introduces the federal “sectoral” approach, where distinct statutes regulate different industries rather than one overarching law. We contrast this with state-level frameworks that increasingly take comprehensive approaches, such as California’s CCPA and CPRA. By examining this domain, you’ll learn how overlapping systems create both compliance challenges and exam scenarios that require careful analysis.</p><p>We also explain why sector-specific laws remain central to the U.S. model, highlighting how they coexist with newer state laws. Understanding this layered structure ensures you can navigate questions about scope, exemptions, and enforcement in different contexts. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:10:21 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f1c32f5c/0415a4f9.mp3" length="64874816" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1621</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Domain II focuses on federal and state laws governing specific sectors such as health, finance, education, and telecommunications. This episode introduces the federal “sectoral” approach, where distinct statutes regulate different industries rather than one overarching law. We contrast this with state-level frameworks that increasingly take comprehensive approaches, such as California’s CCPA and CPRA. By examining this domain, you’ll learn how overlapping systems create both compliance challenges and exam scenarios that require careful analysis.</p><p>We also explain why sector-specific laws remain central to the U.S. model, highlighting how they coexist with newer state laws. Understanding this layered structure ensures you can navigate questions about scope, exemptions, and enforcement in different contexts. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f1c32f5c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 33 — FTC Authority: Section 5 and Consumer Protection in Privacy</title>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>Episode 33 — FTC Authority: Section 5 and Consumer Protection in Privacy</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8408be80-f30f-4280-b28e-2c8d14c9ce3f</guid>
      <link>https://share.transistor.fm/s/b6dc657b</link>
      <description>
        <![CDATA[<p>The Federal Trade Commission is often described as the nation’s top privacy cop. This episode dives into Section 5 of the FTC Act, which prohibits unfair and deceptive acts or practices. We’ll examine how the FTC uses this authority to address privacy and data security, even without specific statutes. Notable cases have established expectations for transparency in privacy notices, promises about data handling, and reasonable safeguards against breaches.</p><p>We also explore the FTC’s limitations, including jurisdictional boundaries and its reliance on consent orders rather than broad rulemaking. For the exam, expect questions that test your ability to identify when the FTC has authority and how Section 5 applies to privacy enforcement. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The Federal Trade Commission is often described as the nation’s top privacy cop. This episode dives into Section 5 of the FTC Act, which prohibits unfair and deceptive acts or practices. We’ll examine how the FTC uses this authority to address privacy and data security, even without specific statutes. Notable cases have established expectations for transparency in privacy notices, promises about data handling, and reasonable safeguards against breaches.</p><p>We also explore the FTC’s limitations, including jurisdictional boundaries and its reliance on consent orders rather than broad rulemaking. For the exam, expect questions that test your ability to identify when the FTC has authority and how Section 5 applies to privacy enforcement. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:10:58 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b6dc657b/5aae0238.mp3" length="63892726" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1596</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The Federal Trade Commission is often described as the nation’s top privacy cop. This episode dives into Section 5 of the FTC Act, which prohibits unfair and deceptive acts or practices. We’ll examine how the FTC uses this authority to address privacy and data security, even without specific statutes. Notable cases have established expectations for transparency in privacy notices, promises about data handling, and reasonable safeguards against breaches.</p><p>We also explore the FTC’s limitations, including jurisdictional boundaries and its reliance on consent orders rather than broad rulemaking. For the exam, expect questions that test your ability to identify when the FTC has authority and how Section 5 applies to privacy enforcement. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b6dc657b/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 34 — COPPA: Children’s Online Privacy Protections in Services</title>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>Episode 34 — COPPA: Children’s Online Privacy Protections in Services</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8e201573-eb5d-4991-a1d2-53cb41bdb32e</guid>
      <link>https://share.transistor.fm/s/fa65e044</link>
      <description>
        <![CDATA[<p>Children’s privacy carries heightened protections in U.S. law. This episode introduces the Children’s Online Privacy Protection Act (COPPA), which governs the collection of personal information from children under 13. We’ll break down requirements such as verifiable parental consent, privacy notice disclosures, and limits on data use and sharing. Enforcement by the FTC has made COPPA one of the most visible privacy statutes.</p><p>We’ll also discuss how COPPA interacts with emerging state laws that extend protections to teens, and why compliance challenges remain significant for online services. Exam questions often focus on age thresholds, consent requirements, and the scope of covered services. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Children’s privacy carries heightened protections in U.S. law. This episode introduces the Children’s Online Privacy Protection Act (COPPA), which governs the collection of personal information from children under 13. We’ll break down requirements such as verifiable parental consent, privacy notice disclosures, and limits on data use and sharing. Enforcement by the FTC has made COPPA one of the most visible privacy statutes.</p><p>We’ll also discuss how COPPA interacts with emerging state laws that extend protections to teens, and why compliance challenges remain significant for online services. Exam questions often focus on age thresholds, consent requirements, and the scope of covered services. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:11:33 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/fa65e044/516a9473.mp3" length="63060400" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1575</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Children’s privacy carries heightened protections in U.S. law. This episode introduces the Children’s Online Privacy Protection Act (COPPA), which governs the collection of personal information from children under 13. We’ll break down requirements such as verifiable parental consent, privacy notice disclosures, and limits on data use and sharing. Enforcement by the FTC has made COPPA one of the most visible privacy statutes.</p><p>We’ll also discuss how COPPA interacts with emerging state laws that extend protections to teens, and why compliance challenges remain significant for online services. Exam questions often focus on age thresholds, consent requirements, and the scope of covered services. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fa65e044/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 35 — FTC Enforcement: Case Studies and Settlement Patterns</title>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>Episode 35 — FTC Enforcement: Case Studies and Settlement Patterns</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">72a98564-9725-41a9-a7da-b56de28243ca</guid>
      <link>https://share.transistor.fm/s/23f24da4</link>
      <description>
        <![CDATA[<p>Enforcement brings theory into practice. In this episode, we review major FTC privacy and data security cases, highlighting recurring themes such as inadequate security, deceptive disclosures, and failure to honor stated practices. These case studies illustrate how the FTC frames violations and the remedies it imposes, from fines to compliance monitoring.</p><p>We’ll also analyze settlement patterns, which provide insight into the agency’s priorities and evolving expectations. Understanding these examples prepares you for exam questions that reference enforcement outcomes and principles, ensuring you can connect theory to real-world application. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Enforcement brings theory into practice. In this episode, we review major FTC privacy and data security cases, highlighting recurring themes such as inadequate security, deceptive disclosures, and failure to honor stated practices. These case studies illustrate how the FTC frames violations and the remedies it imposes, from fines to compliance monitoring.</p><p>We’ll also analyze settlement patterns, which provide insight into the agency’s priorities and evolving expectations. Understanding these examples prepares you for exam questions that reference enforcement outcomes and principles, ensuring you can connect theory to real-world application. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:12:08 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/23f24da4/a76e5048.mp3" length="61447594" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1535</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Enforcement brings theory into practice. In this episode, we review major FTC privacy and data security cases, highlighting recurring themes such as inadequate security, deceptive disclosures, and failure to honor stated practices. These case studies illustrate how the FTC frames violations and the remedies it imposes, from fines to compliance monitoring.</p><p>We’ll also analyze settlement patterns, which provide insight into the agency’s priorities and evolving expectations. Understanding these examples prepares you for exam questions that reference enforcement outcomes and principles, ensuring you can connect theory to real-world application. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/23f24da4/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 36 — Future Priorities: Data Brokers, IoT, AI, and Biometrics</title>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:title>Episode 36 — Future Priorities: Data Brokers, IoT, AI, and Biometrics</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0684938e-a3cb-47f7-bfa8-108e73b5cbad</guid>
      <link>https://share.transistor.fm/s/427deecf</link>
      <description>
        <![CDATA[<p>Privacy law continues to evolve as technology advances. This episode highlights priority areas identified by regulators and policymakers, including the risks posed by data brokers, the proliferation of Internet of Things devices, the rise of artificial intelligence, and the expanding use of biometric identifiers. We’ll discuss why these areas raise unique concerns and how regulators are responding through enforcement, guidance, and proposed legislation.</p><p>Anticipating future trends not only helps you stay ahead professionally but also equips you for exam questions that reference emerging issues. Recognizing patterns in regulatory priorities demonstrates deeper understanding of the U.S. privacy environment. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Privacy law continues to evolve as technology advances. This episode highlights priority areas identified by regulators and policymakers, including the risks posed by data brokers, the proliferation of Internet of Things devices, the rise of artificial intelligence, and the expanding use of biometric identifiers. We’ll discuss why these areas raise unique concerns and how regulators are responding through enforcement, guidance, and proposed legislation.</p><p>Anticipating future trends not only helps you stay ahead professionally but also equips you for exam questions that reference emerging issues. Recognizing patterns in regulatory priorities demonstrates deeper understanding of the U.S. privacy environment. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:12:54 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/427deecf/de9f4000.mp3" length="59503600" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1486</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Privacy law continues to evolve as technology advances. This episode highlights priority areas identified by regulators and policymakers, including the risks posed by data brokers, the proliferation of Internet of Things devices, the rise of artificial intelligence, and the expanding use of biometric identifiers. We’ll discuss why these areas raise unique concerns and how regulators are responding through enforcement, guidance, and proposed legislation.</p><p>Anticipating future trends not only helps you stay ahead professionally but also equips you for exam questions that reference emerging issues. Recognizing patterns in regulatory priorities demonstrates deeper understanding of the U.S. privacy environment. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/427deecf/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 37 — HIPAA Foundations: Privacy Rule Overview</title>
      <itunes:episode>37</itunes:episode>
      <podcast:episode>37</podcast:episode>
      <itunes:title>Episode 37 — HIPAA Foundations: Privacy Rule Overview</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3e6f14d2-35e8-489e-82a0-c104ee8260a6</guid>
      <link>https://share.transistor.fm/s/4317735a</link>
      <description>
        <![CDATA[<p>The Health Insurance Portability and Accountability Act (HIPAA) remains one of the most significant federal privacy statutes. This episode explains the Privacy Rule, which establishes protections for protected health information (PHI). We’ll cover covered entities, business associates, permitted uses and disclosures, and the rights of individuals under HIPAA. This foundation is critical for understanding healthcare privacy.</p><p>We also examine common compliance challenges, such as managing authorizations, responding to access requests, and coordinating with business associates. Exam scenarios frequently involve HIPAA basics, making mastery of the Privacy Rule essential. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The Health Insurance Portability and Accountability Act (HIPAA) remains one of the most significant federal privacy statutes. This episode explains the Privacy Rule, which establishes protections for protected health information (PHI). We’ll cover covered entities, business associates, permitted uses and disclosures, and the rights of individuals under HIPAA. This foundation is critical for understanding healthcare privacy.</p><p>We also examine common compliance challenges, such as managing authorizations, responding to access requests, and coordinating with business associates. Exam scenarios frequently involve HIPAA basics, making mastery of the Privacy Rule essential. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:13:29 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4317735a/7d23f2f6.mp3" length="61706768" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1541</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The Health Insurance Portability and Accountability Act (HIPAA) remains one of the most significant federal privacy statutes. This episode explains the Privacy Rule, which establishes protections for protected health information (PHI). We’ll cover covered entities, business associates, permitted uses and disclosures, and the rights of individuals under HIPAA. This foundation is critical for understanding healthcare privacy.</p><p>We also examine common compliance challenges, such as managing authorizations, responding to access requests, and coordinating with business associates. Exam scenarios frequently involve HIPAA basics, making mastery of the Privacy Rule essential. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4317735a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 38 — HIPAA Security Rule: Administrative, Physical, Technical Safeguards</title>
      <itunes:episode>38</itunes:episode>
      <podcast:episode>38</podcast:episode>
      <itunes:title>Episode 38 — HIPAA Security Rule: Administrative, Physical, Technical Safeguards</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d117e5ca-8008-4a50-9829-8cf49ba6dd84</guid>
      <link>https://share.transistor.fm/s/52d771a7</link>
      <description>
        <![CDATA[<p>Complementing the Privacy Rule, the HIPAA Security Rule sets standards for protecting electronic protected health information (ePHI). This episode breaks down its three safeguard categories: administrative, physical, and technical. Administrative safeguards include policies, risk analyses, and workforce training. Physical safeguards address facility access and workstation security. Technical safeguards cover encryption, access controls, and audit logs.</p><p>By understanding these safeguards, you’ll be prepared for exam questions that test not only definitions but also the application of safeguards to real-world scenarios. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Complementing the Privacy Rule, the HIPAA Security Rule sets standards for protecting electronic protected health information (ePHI). This episode breaks down its three safeguard categories: administrative, physical, and technical. Administrative safeguards include policies, risk analyses, and workforce training. Physical safeguards address facility access and workstation security. Technical safeguards cover encryption, access controls, and audit logs.</p><p>By understanding these safeguards, you’ll be prepared for exam questions that test not only definitions but also the application of safeguards to real-world scenarios. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:14:02 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/52d771a7/0fc99023.mp3" length="56294342" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1406</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Complementing the Privacy Rule, the HIPAA Security Rule sets standards for protecting electronic protected health information (ePHI). This episode breaks down its three safeguard categories: administrative, physical, and technical. Administrative safeguards include policies, risk analyses, and workforce training. Physical safeguards address facility access and workstation security. Technical safeguards cover encryption, access controls, and audit logs.</p><p>By understanding these safeguards, you’ll be prepared for exam questions that test not only definitions but also the application of safeguards to real-world scenarios. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/52d771a7/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 39 — HITECH: Enforcement and Breach Notification Enhancements</title>
      <itunes:episode>39</itunes:episode>
      <podcast:episode>39</podcast:episode>
      <itunes:title>Episode 39 — HITECH: Enforcement and Breach Notification Enhancements</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fdd45eda-2fa0-4dcf-8c6a-fb66b834b222</guid>
      <link>https://share.transistor.fm/s/d1a261a1</link>
      <description>
        <![CDATA[<p>The Health Information Technology for Economic and Clinical Health Act (HITECH) strengthened HIPAA enforcement and introduced federal breach notification requirements. This episode explores how HITECH increased penalties, expanded liability to business associates, and mandated reporting of breaches affecting 500 or more individuals. We’ll also examine how it encouraged adoption of electronic health records, raising both opportunities and risks.</p><p>We highlight how HITECH reshaped the enforcement landscape by giving regulators sharper tools and requiring transparency through public reporting. Expect exam questions that ask you to distinguish between HIPAA’s baseline rules and HITECH’s enhancements. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The Health Information Technology for Economic and Clinical Health Act (HITECH) strengthened HIPAA enforcement and introduced federal breach notification requirements. This episode explores how HITECH increased penalties, expanded liability to business associates, and mandated reporting of breaches affecting 500 or more individuals. We’ll also examine how it encouraged adoption of electronic health records, raising both opportunities and risks.</p><p>We highlight how HITECH reshaped the enforcement landscape by giving regulators sharper tools and requiring transparency through public reporting. Expect exam questions that ask you to distinguish between HIPAA’s baseline rules and HITECH’s enhancements. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:14:34 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d1a261a1/f2a1a227.mp3" length="52900720" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1321</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The Health Information Technology for Economic and Clinical Health Act (HITECH) strengthened HIPAA enforcement and introduced federal breach notification requirements. This episode explores how HITECH increased penalties, expanded liability to business associates, and mandated reporting of breaches affecting 500 or more individuals. We’ll also examine how it encouraged adoption of electronic health records, raising both opportunities and risks.</p><p>We highlight how HITECH reshaped the enforcement landscape by giving regulators sharper tools and requiring transparency through public reporting. Expect exam questions that ask you to distinguish between HIPAA’s baseline rules and HITECH’s enhancements. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d1a261a1/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 40 — 21st Century Cures: Interoperability and Data Sharing</title>
      <itunes:episode>40</itunes:episode>
      <podcast:episode>40</podcast:episode>
      <itunes:title>Episode 40 — 21st Century Cures: Interoperability and Data Sharing</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fef5e80b-d572-4bd0-ab2a-1e3d41376c7f</guid>
      <link>https://share.transistor.fm/s/bd3e940c</link>
      <description>
        <![CDATA[<p>The 21st Century Cures Act sought to promote innovation by improving interoperability and data sharing in healthcare. This episode explains how the Act prohibits “information blocking,” requiring health IT systems to enable secure, authorized data exchange. While designed to empower patients and providers, these provisions also raise privacy and security challenges.</p><p>We’ll review how regulators balance interoperability with confidentiality, and how the Act interacts with HIPAA and HITECH. Exam questions may test your understanding of this balance and the obligations it creates for healthcare organizations. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The 21st Century Cures Act sought to promote innovation by improving interoperability and data sharing in healthcare. This episode explains how the Act prohibits “information blocking,” requiring health IT systems to enable secure, authorized data exchange. While designed to empower patients and providers, these provisions also raise privacy and security challenges.</p><p>We’ll review how regulators balance interoperability with confidentiality, and how the Act interacts with HIPAA and HITECH. Exam questions may test your understanding of this balance and the obligations it creates for healthcare organizations. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:15:32 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/bd3e940c/3862f95e.mp3" length="53282794" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1331</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The 21st Century Cures Act sought to promote innovation by improving interoperability and data sharing in healthcare. This episode explains how the Act prohibits “information blocking,” requiring health IT systems to enable secure, authorized data exchange. While designed to empower patients and providers, these provisions also raise privacy and security challenges.</p><p>We’ll review how regulators balance interoperability with confidentiality, and how the Act interacts with HIPAA and HITECH. Exam questions may test your understanding of this balance and the obligations it creates for healthcare organizations. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bd3e940c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 41 — Substance Use Disorder Records: 42 CFR Part 2 Protections</title>
      <itunes:episode>41</itunes:episode>
      <podcast:episode>41</podcast:episode>
      <itunes:title>Episode 41 — Substance Use Disorder Records: 42 CFR Part 2 Protections</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a4eaafcc-89de-4fcf-abb5-3698f216410b</guid>
      <link>https://share.transistor.fm/s/e1e4fa56</link>
      <description>
        <![CDATA[<p>Health information involving substance use disorder patients receives special protections under federal law. This episode explains 42 CFR Part 2, which imposes stricter confidentiality standards than HIPAA. We’ll discuss what types of programs and providers are covered, the rules for consent, and the limits on disclosure even to law enforcement and other agencies. These protections aim to reduce stigma and encourage treatment while still permitting carefully defined exceptions.</p><p>We also explore how Part 2 interacts with HIPAA, particularly when providers must comply with both frameworks. Understanding these rules is essential for healthcare privacy compliance and often appears in exam scenarios dealing with sensitive categories of information. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Health information involving substance use disorder patients receives special protections under federal law. This episode explains 42 CFR Part 2, which imposes stricter confidentiality standards than HIPAA. We’ll discuss what types of programs and providers are covered, the rules for consent, and the limits on disclosure even to law enforcement and other agencies. These protections aim to reduce stigma and encourage treatment while still permitting carefully defined exceptions.</p><p>We also explore how Part 2 interacts with HIPAA, particularly when providers must comply with both frameworks. Understanding these rules is essential for healthcare privacy compliance and often appears in exam scenarios dealing with sensitive categories of information. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:16:04 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e1e4fa56/cf3ef10e.mp3" length="53962482" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1348</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Health information involving substance use disorder patients receives special protections under federal law. This episode explains 42 CFR Part 2, which imposes stricter confidentiality standards than HIPAA. We’ll discuss what types of programs and providers are covered, the rules for consent, and the limits on disclosure even to law enforcement and other agencies. These protections aim to reduce stigma and encourage treatment while still permitting carefully defined exceptions.</p><p>We also explore how Part 2 interacts with HIPAA, particularly when providers must comply with both frameworks. Understanding these rules is essential for healthcare privacy compliance and often appears in exam scenarios dealing with sensitive categories of information. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e1e4fa56/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 42 — Financial Privacy: FCRA and FACTA Requirements</title>
      <itunes:episode>42</itunes:episode>
      <podcast:episode>42</podcast:episode>
      <itunes:title>Episode 42 — Financial Privacy: FCRA and FACTA Requirements</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f5a50384-ca56-402a-9bb0-19a8eddb0e5b</guid>
      <link>https://share.transistor.fm/s/48472f72</link>
      <description>
        <![CDATA[<p>Financial data is heavily regulated in the U.S., and two major statutes govern its use: the Fair Credit Reporting Act (FCRA) and the Fair and Accurate Credit Transactions Act (FACTA). In this episode, we examine how FCRA establishes accuracy, permissible purpose, and consumer rights to access and correct information. FACTA builds on this by addressing identity theft and credit reporting practices. Together, they shape how financial institutions and credit bureaus handle consumer data.</p><p>We’ll also discuss enforcement, consumer remedies, and how these laws intersect with state privacy frameworks. Exam questions frequently reference these statutes, so understanding their scope and key provisions is vital. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Financial data is heavily regulated in the U.S., and two major statutes govern its use: the Fair Credit Reporting Act (FCRA) and the Fair and Accurate Credit Transactions Act (FACTA). In this episode, we examine how FCRA establishes accuracy, permissible purpose, and consumer rights to access and correct information. FACTA builds on this by addressing identity theft and credit reporting practices. Together, they shape how financial institutions and credit bureaus handle consumer data.</p><p>We’ll also discuss enforcement, consumer remedies, and how these laws intersect with state privacy frameworks. Exam questions frequently reference these statutes, so understanding their scope and key provisions is vital. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:16:36 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/48472f72/a9f5ab2b.mp3" length="50781980" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1268</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Financial data is heavily regulated in the U.S., and two major statutes govern its use: the Fair Credit Reporting Act (FCRA) and the Fair and Accurate Credit Transactions Act (FACTA). In this episode, we examine how FCRA establishes accuracy, permissible purpose, and consumer rights to access and correct information. FACTA builds on this by addressing identity theft and credit reporting practices. Together, they shape how financial institutions and credit bureaus handle consumer data.</p><p>We’ll also discuss enforcement, consumer remedies, and how these laws intersect with state privacy frameworks. Exam questions frequently reference these statutes, so understanding their scope and key provisions is vital. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/48472f72/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 43 — GLBA: Privacy Rule, Safeguards Rule, and State Exemptions</title>
      <itunes:episode>43</itunes:episode>
      <podcast:episode>43</podcast:episode>
      <itunes:title>Episode 43 — GLBA: Privacy Rule, Safeguards Rule, and State Exemptions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b5294042-50a7-4670-8b99-caec1cc98e87</guid>
      <link>https://share.transistor.fm/s/a9366b08</link>
      <description>
        <![CDATA[<p>The Gramm-Leach-Bliley Act (GLBA) governs privacy in the financial services sector. This episode introduces the GLBA Privacy Rule, which requires clear disclosures about data sharing and provides consumers the right to opt out of certain uses. We’ll also cover the Safeguards Rule, mandating administrative, technical, and physical protections for customer data. Importantly, we explore how some state laws modify or expand on GLBA requirements.</p><p>We highlight common exam points, such as which institutions qualify as financial under GLBA and what disclosures must be provided. By mastering these distinctions, you’ll be well-prepared to analyze GLBA scenarios in exam questions. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The Gramm-Leach-Bliley Act (GLBA) governs privacy in the financial services sector. This episode introduces the GLBA Privacy Rule, which requires clear disclosures about data sharing and provides consumers the right to opt out of certain uses. We’ll also cover the Safeguards Rule, mandating administrative, technical, and physical protections for customer data. Importantly, we explore how some state laws modify or expand on GLBA requirements.</p><p>We highlight common exam points, such as which institutions qualify as financial under GLBA and what disclosures must be provided. By mastering these distinctions, you’ll be well-prepared to analyze GLBA scenarios in exam questions. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:17:09 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a9366b08/a0401c13.mp3" length="55205682" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1379</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The Gramm-Leach-Bliley Act (GLBA) governs privacy in the financial services sector. This episode introduces the GLBA Privacy Rule, which requires clear disclosures about data sharing and provides consumers the right to opt out of certain uses. We’ll also cover the Safeguards Rule, mandating administrative, technical, and physical protections for customer data. Importantly, we explore how some state laws modify or expand on GLBA requirements.</p><p>We highlight common exam points, such as which institutions qualify as financial under GLBA and what disclosures must be provided. By mastering these distinctions, you’ll be well-prepared to analyze GLBA scenarios in exam questions. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a9366b08/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 44 — Identity Theft Prevention: Red Flags Rule in Practice</title>
      <itunes:episode>44</itunes:episode>
      <podcast:episode>44</podcast:episode>
      <itunes:title>Episode 44 — Identity Theft Prevention: Red Flags Rule in Practice</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2a8c9efe-d538-402e-832c-cf4535fa3297</guid>
      <link>https://share.transistor.fm/s/6d2f604a</link>
      <description>
        <![CDATA[<p>The Red Flags Rule is designed to help organizations detect, prevent, and mitigate identity theft. This episode explains how financial institutions and certain creditors must develop programs that identify warning signs—or “red flags”—of potential fraud. We’ll review the categories of red flags, from suspicious documents to unusual account activity, and discuss how compliance programs integrate monitoring and staff training.</p><p>Understanding the Red Flags Rule provides insight into how regulators expect proactive risk management. For the exam, focus on the definitions, covered entities, and the purpose of these obligations in consumer protection. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The Red Flags Rule is designed to help organizations detect, prevent, and mitigate identity theft. This episode explains how financial institutions and certain creditors must develop programs that identify warning signs—or “red flags”—of potential fraud. We’ll review the categories of red flags, from suspicious documents to unusual account activity, and discuss how compliance programs integrate monitoring and staff training.</p><p>Understanding the Red Flags Rule provides insight into how regulators expect proactive risk management. For the exam, focus on the definitions, covered entities, and the purpose of these obligations in consumer protection. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:17:48 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6d2f604a/644c7700.mp3" length="49327594" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1232</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The Red Flags Rule is designed to help organizations detect, prevent, and mitigate identity theft. This episode explains how financial institutions and certain creditors must develop programs that identify warning signs—or “red flags”—of potential fraud. We’ll review the categories of red flags, from suspicious documents to unusual account activity, and discuss how compliance programs integrate monitoring and staff training.</p><p>Understanding the Red Flags Rule provides insight into how regulators expect proactive risk management. For the exam, focus on the definitions, covered entities, and the purpose of these obligations in consumer protection. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6d2f604a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 45 — Dodd-Frank: CFPB Oversight of Consumer Financial Privacy</title>
      <itunes:episode>45</itunes:episode>
      <podcast:episode>45</podcast:episode>
      <itunes:title>Episode 45 — Dodd-Frank: CFPB Oversight of Consumer Financial Privacy</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5dd2a471-63b2-433f-866a-531417232005</guid>
      <link>https://share.transistor.fm/s/b7a4f065</link>
      <description>
        <![CDATA[<p>The Dodd-Frank Wall Street Reform and Consumer Protection Act created the Consumer Financial Protection Bureau (CFPB), which plays a central role in financial privacy. This episode explains the CFPB’s authority, its supervision of financial institutions, and its role in enforcing consumer privacy protections. We’ll also cover how Dodd-Frank introduced new requirements for transparency, accountability, and risk management.</p><p>Exam questions often test your knowledge of the CFPB’s role and its overlap with other regulators. Understanding Dodd-Frank’s impact on consumer privacy gives you another piece of the puzzle in the federal sectoral model. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The Dodd-Frank Wall Street Reform and Consumer Protection Act created the Consumer Financial Protection Bureau (CFPB), which plays a central role in financial privacy. This episode explains the CFPB’s authority, its supervision of financial institutions, and its role in enforcing consumer privacy protections. We’ll also cover how Dodd-Frank introduced new requirements for transparency, accountability, and risk management.</p><p>Exam questions often test your knowledge of the CFPB’s role and its overlap with other regulators. Understanding Dodd-Frank’s impact on consumer privacy gives you another piece of the puzzle in the federal sectoral model. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:18:20 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b7a4f065/279ae860.mp3" length="48753520" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1217</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The Dodd-Frank Wall Street Reform and Consumer Protection Act created the Consumer Financial Protection Bureau (CFPB), which plays a central role in financial privacy. This episode explains the CFPB’s authority, its supervision of financial institutions, and its role in enforcing consumer privacy protections. We’ll also cover how Dodd-Frank introduced new requirements for transparency, accountability, and risk management.</p><p>Exam questions often test your knowledge of the CFPB’s role and its overlap with other regulators. Understanding Dodd-Frank’s impact on consumer privacy gives you another piece of the puzzle in the federal sectoral model. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b7a4f065/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 46 — Online Banking: Biometrics, Third-Party Tracking, and Security</title>
      <itunes:episode>46</itunes:episode>
      <podcast:episode>46</podcast:episode>
      <itunes:title>Episode 46 — Online Banking: Biometrics, Third-Party Tracking, and Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">69e51b24-0065-4753-9e3f-f5ee8b5c480d</guid>
      <link>https://share.transistor.fm/s/5c2e09ab</link>
      <description>
        <![CDATA[<p>Online banking raises unique privacy issues. This episode looks at how institutions use biometrics for authentication, the risks of third-party tracking in financial apps, and the growing security concerns in digital transactions. We’ll explore how these practices intersect with existing financial privacy laws, including GLBA, FCRA, and state breach notification statutes.</p><p>We’ll also examine how regulators assess whether institutions meet their obligations in an online environment. These questions highlight the importance of understanding how laws apply to emerging technologies, making this a high-value area for exam preparation. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Online banking raises unique privacy issues. This episode looks at how institutions use biometrics for authentication, the risks of third-party tracking in financial apps, and the growing security concerns in digital transactions. We’ll explore how these practices intersect with existing financial privacy laws, including GLBA, FCRA, and state breach notification statutes.</p><p>We’ll also examine how regulators assess whether institutions meet their obligations in an online environment. These questions highlight the importance of understanding how laws apply to emerging technologies, making this a high-value area for exam preparation. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:18:50 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/5c2e09ab/63eb0a64.mp3" length="52051132" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1300</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Online banking raises unique privacy issues. This episode looks at how institutions use biometrics for authentication, the risks of third-party tracking in financial apps, and the growing security concerns in digital transactions. We’ll explore how these practices intersect with existing financial privacy laws, including GLBA, FCRA, and state breach notification statutes.</p><p>We’ll also examine how regulators assess whether institutions meet their obligations in an online environment. These questions highlight the importance of understanding how laws apply to emerging technologies, making this a high-value area for exam preparation. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5c2e09ab/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 47 — Corporate Transactions: Privacy in Mergers, Acquisitions, and Divestitures</title>
      <itunes:episode>47</itunes:episode>
      <podcast:episode>47</podcast:episode>
      <itunes:title>Episode 47 — Corporate Transactions: Privacy in Mergers, Acquisitions, and Divestitures</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ac6df56d-d16b-4877-9ae9-6967bedaaf99</guid>
      <link>https://share.transistor.fm/s/2681f3ec</link>
      <description>
        <![CDATA[<p>Mergers and acquisitions often involve transferring large volumes of personal data. This episode explains the privacy implications of corporate transactions, including how due diligence identifies risks and how contracts manage ongoing obligations. We’ll also discuss how regulators evaluate whether consumer consent is required when data changes hands.</p><p>For exam purposes, you should understand how privacy obligations persist across ownership changes and how exceptions or exemptions may apply. This episode connects privacy law to corporate governance and risk management, themes that recur throughout the course. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Mergers and acquisitions often involve transferring large volumes of personal data. This episode explains the privacy implications of corporate transactions, including how due diligence identifies risks and how contracts manage ongoing obligations. We’ll also discuss how regulators evaluate whether consumer consent is required when data changes hands.</p><p>For exam purposes, you should understand how privacy obligations persist across ownership changes and how exceptions or exemptions may apply. This episode connects privacy law to corporate governance and risk management, themes that recur throughout the course. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:19:23 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2681f3ec/f981d48d.mp3" length="50505556" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1261</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Mergers and acquisitions often involve transferring large volumes of personal data. This episode explains the privacy implications of corporate transactions, including how due diligence identifies risks and how contracts manage ongoing obligations. We’ll also discuss how regulators evaluate whether consumer consent is required when data changes hands.</p><p>For exam purposes, you should understand how privacy obligations persist across ownership changes and how exceptions or exemptions may apply. This episode connects privacy law to corporate governance and risk management, themes that recur throughout the course. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2681f3ec/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 48 — FERPA: Education Records and Student Rights</title>
      <itunes:episode>48</itunes:episode>
      <podcast:episode>48</podcast:episode>
      <itunes:title>Episode 48 — FERPA: Education Records and Student Rights</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">08d41441-05a2-4619-be93-8c20e8ead040</guid>
      <link>https://share.transistor.fm/s/7f33be6d</link>
      <description>
        <![CDATA[<p>The Family Educational Rights and Privacy Act (FERPA) governs the privacy of student education records. This episode explains the rights it grants to parents and students, including access, correction, and consent for disclosure. We’ll also review exceptions, such as disclosures to school officials or in cases of health and safety emergencies.</p><p>We’ll highlight how FERPA applies to both K–12 and higher education institutions, and how it interacts with emerging EdTech tools. Exam questions frequently reference FERPA’s definitions and exceptions, so clear mastery is essential. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The Family Educational Rights and Privacy Act (FERPA) governs the privacy of student education records. This episode explains the rights it grants to parents and students, including access, correction, and consent for disclosure. We’ll also review exceptions, such as disclosures to school officials or in cases of health and safety emergencies.</p><p>We’ll highlight how FERPA applies to both K–12 and higher education institutions, and how it interacts with emerging EdTech tools. Exam questions frequently reference FERPA’s definitions and exceptions, so clear mastery is essential. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:19:59 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7f33be6d/f4b85cab.mp3" length="47300054" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1181</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The Family Educational Rights and Privacy Act (FERPA) governs the privacy of student education records. This episode explains the rights it grants to parents and students, including access, correction, and consent for disclosure. We’ll also review exceptions, such as disclosures to school officials or in cases of health and safety emergencies.</p><p>We’ll highlight how FERPA applies to both K–12 and higher education institutions, and how it interacts with emerging EdTech tools. Exam questions frequently reference FERPA’s definitions and exceptions, so clear mastery is essential. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7f33be6d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 49 — EdTech Risks: Privacy and Security in Educational Technologies</title>
      <itunes:episode>49</itunes:episode>
      <podcast:episode>49</podcast:episode>
      <itunes:title>Episode 49 — EdTech Risks: Privacy and Security in Educational Technologies</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b232a15f-a21d-4f84-a344-ccbd08e2a134</guid>
      <link>https://share.transistor.fm/s/a8a04ebb</link>
      <description>
        <![CDATA[<p>As schools adopt digital platforms, new privacy and security risks emerge. This episode explores issues such as online learning platforms collecting student data, targeted advertising in education settings, and cybersecurity vulnerabilities. We’ll also discuss how FERPA and other laws address these risks, along with guidance from regulators.</p><p>We’ll cover the tension between innovation and protection, highlighting how compliance strategies adapt to new technologies. For the exam, expect scenarios that test your ability to apply FERPA and related rules to EdTech contexts. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>As schools adopt digital platforms, new privacy and security risks emerge. This episode explores issues such as online learning platforms collecting student data, targeted advertising in education settings, and cybersecurity vulnerabilities. We’ll also discuss how FERPA and other laws address these risks, along with guidance from regulators.</p><p>We’ll cover the tension between innovation and protection, highlighting how compliance strategies adapt to new technologies. For the exam, expect scenarios that test your ability to apply FERPA and related rules to EdTech contexts. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:20:33 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a8a04ebb/9a13a452.mp3" length="46340092" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1157</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>As schools adopt digital platforms, new privacy and security risks emerge. This episode explores issues such as online learning platforms collecting student data, targeted advertising in education settings, and cybersecurity vulnerabilities. We’ll also discuss how FERPA and other laws address these risks, along with guidance from regulators.</p><p>We’ll cover the tension between innovation and protection, highlighting how compliance strategies adapt to new technologies. For the exam, expect scenarios that test your ability to apply FERPA and related rules to EdTech contexts. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a8a04ebb/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 50 — Telemarketing Rules: TSR and TCPA</title>
      <itunes:episode>50</itunes:episode>
      <podcast:episode>50</podcast:episode>
      <itunes:title>Episode 50 — Telemarketing Rules: TSR and TCPA</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d8c6433b-b508-4370-9a1f-a3f47174b112</guid>
      <link>https://share.transistor.fm/s/dd346c98</link>
      <description>
        <![CDATA[<p>Telemarketing is tightly regulated under the Telemarketing Sales Rule (TSR) and the Telephone Consumer Protection Act (TCPA). This episode explains the key provisions, including requirements for disclosures, restrictions on calling times, and consent for autodialed or prerecorded calls. We’ll also review penalties for violations and the role of the Do-Not-Call registry.</p><p>By understanding these rules, you’ll see how consumer protection intersects with privacy law in the marketing sector. Exam questions often hinge on distinguishing between TSR and TCPA obligations, making this a must-know topic. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Telemarketing is tightly regulated under the Telemarketing Sales Rule (TSR) and the Telephone Consumer Protection Act (TCPA). This episode explains the key provisions, including requirements for disclosures, restrictions on calling times, and consent for autodialed or prerecorded calls. We’ll also review penalties for violations and the role of the Do-Not-Call registry.</p><p>By understanding these rules, you’ll see how consumer protection intersects with privacy law in the marketing sector. Exam questions often hinge on distinguishing between TSR and TCPA obligations, making this a must-know topic. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:21:06 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/dd346c98/a60ce12a.mp3" length="41415234" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1034</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Telemarketing is tightly regulated under the Telemarketing Sales Rule (TSR) and the Telephone Consumer Protection Act (TCPA). This episode explains the key provisions, including requirements for disclosures, restrictions on calling times, and consent for autodialed or prerecorded calls. We’ll also review penalties for violations and the role of the Do-Not-Call registry.</p><p>By understanding these rules, you’ll see how consumer protection intersects with privacy law in the marketing sector. Exam questions often hinge on distinguishing between TSR and TCPA obligations, making this a must-know topic. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/dd346c98/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 51 — Email and Fax Marketing: CAN-SPAM and JFPA</title>
      <itunes:episode>51</itunes:episode>
      <podcast:episode>51</podcast:episode>
      <itunes:title>Episode 51 — Email and Fax Marketing: CAN-SPAM and JFPA</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9cdc568f-fae2-4147-9126-d9bcfe8862d4</guid>
      <link>https://share.transistor.fm/s/6a85dc25</link>
      <description>
        <![CDATA[<p>Electronic communications are major areas of privacy regulation. This episode explores the CAN-SPAM Act, which sets standards for commercial email, including opt-out requirements, truth in subject lines, and identification of advertisements. We’ll also cover the Junk Fax Prevention Act (JFPA), which restricts unsolicited fax marketing and outlines conditions for permissible messages. Together, these laws establish the rules for how organizations may use electronic channels for marketing while protecting consumers from spam and abuse.</p><p>We’ll also discuss how enforcement actions have shaped compliance strategies, from record-keeping to honoring opt-out requests promptly. Exam questions often require distinguishing between email and fax regulations, making mastery of both essential for success. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Electronic communications are major areas of privacy regulation. This episode explores the CAN-SPAM Act, which sets standards for commercial email, including opt-out requirements, truth in subject lines, and identification of advertisements. We’ll also cover the Junk Fax Prevention Act (JFPA), which restricts unsolicited fax marketing and outlines conditions for permissible messages. Together, these laws establish the rules for how organizations may use electronic channels for marketing while protecting consumers from spam and abuse.</p><p>We’ll also discuss how enforcement actions have shaped compliance strategies, from record-keeping to honoring opt-out requests promptly. Exam questions often require distinguishing between email and fax regulations, making mastery of both essential for success. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:21:35 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6a85dc25/18ae7a89.mp3" length="46346772" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1157</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Electronic communications are major areas of privacy regulation. This episode explores the CAN-SPAM Act, which sets standards for commercial email, including opt-out requirements, truth in subject lines, and identification of advertisements. We’ll also cover the Junk Fax Prevention Act (JFPA), which restricts unsolicited fax marketing and outlines conditions for permissible messages. Together, these laws establish the rules for how organizations may use electronic channels for marketing while protecting consumers from spam and abuse.</p><p>We’ll also discuss how enforcement actions have shaped compliance strategies, from record-keeping to honoring opt-out requests promptly. Exam questions often require distinguishing between email and fax regulations, making mastery of both essential for success. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6a85dc25/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 52 — Telecom and Media Statutes: Telecommunications Act, Cable Act, VPPA, and DPPA</title>
      <itunes:episode>52</itunes:episode>
      <podcast:episode>52</podcast:episode>
      <itunes:title>Episode 52 — Telecom and Media Statutes: Telecommunications Act, Cable Act, VPPA, and DPPA</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f83e2477-8050-466f-9a95-9a631387ce96</guid>
      <link>https://share.transistor.fm/s/0ece4099</link>
      <description>
        <![CDATA[<p>Telecommunications and media involve a complex mix of statutes. This episode reviews the Telecommunications Act of 1996, which regulates customer proprietary network information, the Cable Communications Policy Act of 1984, which addresses subscriber privacy, and the Video Privacy Protection Act (VPPA), which restricts disclosure of video rental records. We’ll also cover the Driver’s Privacy Protection Act (DPPA), which limits disclosure of motor vehicle record information.</p><p>These laws illustrate how privacy protections have been adopted piecemeal in response to technological and social developments. For the exam, you’ll need to identify the scope, rights, and restrictions under each statute, as they are often directly tested. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Telecommunications and media involve a complex mix of statutes. This episode reviews the Telecommunications Act of 1996, which regulates customer proprietary network information, the Cable Communications Policy Act of 1984, which addresses subscriber privacy, and the Video Privacy Protection Act (VPPA), which restricts disclosure of video rental records. We’ll also cover the Driver’s Privacy Protection Act (DPPA), which limits disclosure of motor vehicle record information.</p><p>These laws illustrate how privacy protections have been adopted piecemeal in response to technological and social developments. For the exam, you’ll need to identify the scope, rights, and restrictions under each statute, as they are often directly tested. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:22:07 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0ece4099/96aac085.mp3" length="52735642" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1317</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Telecommunications and media involve a complex mix of statutes. This episode reviews the Telecommunications Act of 1996, which regulates customer proprietary network information, the Cable Communications Policy Act of 1984, which addresses subscriber privacy, and the Video Privacy Protection Act (VPPA), which restricts disclosure of video rental records. We’ll also cover the Driver’s Privacy Protection Act (DPPA), which limits disclosure of motor vehicle record information.</p><p>These laws illustrate how privacy protections have been adopted piecemeal in response to technological and social developments. For the exam, you’ll need to identify the scope, rights, and restrictions under each statute, as they are often directly tested. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0ece4099/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 53 — Do-Not-Call Registries: DNC and Wireless Domain Registry</title>
      <itunes:episode>53</itunes:episode>
      <podcast:episode>53</podcast:episode>
      <itunes:title>Episode 53 — Do-Not-Call Registries: DNC and Wireless Domain Registry</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7a1795de-8dcf-49c9-94cd-a510234f8a4f</guid>
      <link>https://share.transistor.fm/s/73ebe2cd</link>
      <description>
        <![CDATA[<p>Telemarketing restrictions extend beyond the TSR and TCPA through registries that give consumers control. This episode explains the National Do-Not-Call (DNC) Registry, how consumers enroll, and the obligations it imposes on telemarketers. We also review the Wireless Domain Registry, which protects consumers from unwanted text marketing. These registries are key enforcement tools that regulators use to ensure compliance.</p><p>We’ll also discuss exemptions and exceptions, such as calls from political campaigns or nonprofits. Exam questions often test knowledge of what is allowed versus prohibited under these frameworks. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Telemarketing restrictions extend beyond the TSR and TCPA through registries that give consumers control. This episode explains the National Do-Not-Call (DNC) Registry, how consumers enroll, and the obligations it imposes on telemarketers. We also review the Wireless Domain Registry, which protects consumers from unwanted text marketing. These registries are key enforcement tools that regulators use to ensure compliance.</p><p>We’ll also discuss exemptions and exceptions, such as calls from political campaigns or nonprofits. Exam questions often test knowledge of what is allowed versus prohibited under these frameworks. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:22:45 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/73ebe2cd/b496e322.mp3" length="53986480" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1348</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Telemarketing restrictions extend beyond the TSR and TCPA through registries that give consumers control. This episode explains the National Do-Not-Call (DNC) Registry, how consumers enroll, and the obligations it imposes on telemarketers. We also review the Wireless Domain Registry, which protects consumers from unwanted text marketing. These registries are key enforcement tools that regulators use to ensure compliance.</p><p>We’ll also discuss exemptions and exceptions, such as calls from political campaigns or nonprofits. Exam questions often test knowledge of what is allowed versus prohibited under these frameworks. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/73ebe2cd/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 54 — Digital Advertising: Behavioral Tracking and Privacy Implications</title>
      <itunes:episode>54</itunes:episode>
      <podcast:episode>54</podcast:episode>
      <itunes:title>Episode 54 — Digital Advertising: Behavioral Tracking and Privacy Implications</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4447447d-54e8-4743-aed3-c1b2a9b711c2</guid>
      <link>https://share.transistor.fm/s/2de22d18</link>
      <description>
        <![CDATA[<p>Digital advertising relies heavily on tracking and profiling. This episode covers cookies, pixels, and device identifiers, along with how they enable targeted ads. We’ll examine the privacy implications of these practices, including transparency, consent, and opt-out mechanisms. We’ll also discuss how regulators approach online behavioral advertising through enforcement actions and guidance.</p><p>Understanding these issues prepares you for exam scenarios involving online commerce and consumer expectations. By mastering how digital advertising intersects with privacy law, you’ll gain insight into one of the fastest-changing areas of regulation. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Digital advertising relies heavily on tracking and profiling. This episode covers cookies, pixels, and device identifiers, along with how they enable targeted ads. We’ll examine the privacy implications of these practices, including transparency, consent, and opt-out mechanisms. We’ll also discuss how regulators approach online behavioral advertising through enforcement actions and guidance.</p><p>Understanding these issues prepares you for exam scenarios involving online commerce and consumer expectations. By mastering how digital advertising intersects with privacy law, you’ll gain insight into one of the fastest-changing areas of regulation. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:23:41 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2de22d18/b0642a40.mp3" length="59758018" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1493</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Digital advertising relies heavily on tracking and profiling. This episode covers cookies, pixels, and device identifiers, along with how they enable targeted ads. We’ll examine the privacy implications of these practices, including transparency, consent, and opt-out mechanisms. We’ll also discuss how regulators approach online behavioral advertising through enforcement actions and guidance.</p><p>Understanding these issues prepares you for exam scenarios involving online commerce and consumer expectations. By mastering how digital advertising intersects with privacy law, you’ll gain insight into one of the fastest-changing areas of regulation. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2de22d18/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 55 — Web Scraping: Data Ethics and Legal Risk Considerations</title>
      <itunes:episode>55</itunes:episode>
      <podcast:episode>55</podcast:episode>
      <itunes:title>Episode 55 — Web Scraping: Data Ethics and Legal Risk Considerations</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8824e4cc-9803-4a03-a51b-5661fe808487</guid>
      <link>https://share.transistor.fm/s/865b3152</link>
      <description>
        <![CDATA[<p>Web scraping raises both ethical and legal challenges. This episode explains how scraping can collect vast amounts of personal information, often without consumer knowledge. We’ll discuss relevant statutes, contract law through terms of service, and enforcement actions related to unauthorized scraping. We’ll also consider the risks organizations face when data is scraped from their sites.</p><p>For exam purposes, focus on the privacy implications, including consumer expectations, regulatory scrutiny, and potential liability. Scraping is a growing issue, and understanding its contours gives you an edge in analyzing modern data risks. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Web scraping raises both ethical and legal challenges. This episode explains how scraping can collect vast amounts of personal information, often without consumer knowledge. We’ll discuss relevant statutes, contract law through terms of service, and enforcement actions related to unauthorized scraping. We’ll also consider the risks organizations face when data is scraped from their sites.</p><p>For exam purposes, focus on the privacy implications, including consumer expectations, regulatory scrutiny, and potential liability. Scraping is a growing issue, and understanding its contours gives you an edge in analyzing modern data risks. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:24:12 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/865b3152/7ace7a5f.mp3" length="60168878" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1503</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Web scraping raises both ethical and legal challenges. This episode explains how scraping can collect vast amounts of personal information, often without consumer knowledge. We’ll discuss relevant statutes, contract law through terms of service, and enforcement actions related to unauthorized scraping. We’ll also consider the risks organizations face when data is scraped from their sites.</p><p>For exam purposes, focus on the privacy implications, including consumer expectations, regulatory scrutiny, and potential liability. Scraping is a growing issue, and understanding its contours gives you an edge in analyzing modern data risks. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/865b3152/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 56 — Domain III Overview: Privacy and Government Requests for Data</title>
      <itunes:episode>56</itunes:episode>
      <podcast:episode>56</podcast:episode>
      <itunes:title>Episode 56 — Domain III Overview: Privacy and Government Requests for Data</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f34bc44c-f736-4df5-9fc4-247392331dd6</guid>
      <link>https://share.transistor.fm/s/cf7bfa08</link>
      <description>
        <![CDATA[<p>Domain III introduces the critical issue of government access to private-sector information. This episode provides an overview of how laws regulate subpoenas, warrants, and requests from law enforcement or intelligence agencies. We’ll highlight statutes like the Electronic Communications Privacy Act (ECPA), the Foreign Intelligence Surveillance Act (FISA), and others that govern government demands.</p><p>We also discuss how companies must balance compliance with these requests against obligations to protect personal information. Exam questions in this domain test your ability to recognize applicable statutes and analyze access scenarios. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Domain III introduces the critical issue of government access to private-sector information. This episode provides an overview of how laws regulate subpoenas, warrants, and requests from law enforcement or intelligence agencies. We’ll highlight statutes like the Electronic Communications Privacy Act (ECPA), the Foreign Intelligence Surveillance Act (FISA), and others that govern government demands.</p><p>We also discuss how companies must balance compliance with these requests against obligations to protect personal information. Exam questions in this domain test your ability to recognize applicable statutes and analyze access scenarios. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:24:44 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/cf7bfa08/a7ead6c0.mp3" length="67361210" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1683</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Domain III introduces the critical issue of government access to private-sector information. This episode provides an overview of how laws regulate subpoenas, warrants, and requests from law enforcement or intelligence agencies. We’ll highlight statutes like the Electronic Communications Privacy Act (ECPA), the Foreign Intelligence Surveillance Act (FISA), and others that govern government demands.</p><p>We also discuss how companies must balance compliance with these requests against obligations to protect personal information. Exam questions in this domain test your ability to recognize applicable statutes and analyze access scenarios. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/cf7bfa08/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 57 — Financial Data Access: RFPA and BSA Requirements</title>
      <itunes:episode>57</itunes:episode>
      <podcast:episode>57</podcast:episode>
      <itunes:title>Episode 57 — Financial Data Access: RFPA and BSA Requirements</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0799a096-e4a8-4978-98ea-a54a68a7b1d5</guid>
      <link>https://share.transistor.fm/s/f798cf6c</link>
      <description>
        <![CDATA[<p>Government access to financial data is governed by specific laws. This episode covers the Right to Financial Privacy Act (RFPA), which sets limits on government access to bank records, and the Bank Secrecy Act (BSA), which requires institutions to monitor and report suspicious activity. These laws illustrate the tension between privacy rights and government oversight of financial systems.</p><p>We’ll also explain how compliance programs, such as anti-money-laundering efforts, intersect with privacy obligations. On the exam, expect questions about the scope of RFPA protections and the reporting requirements under the BSA. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Government access to financial data is governed by specific laws. This episode covers the Right to Financial Privacy Act (RFPA), which sets limits on government access to bank records, and the Bank Secrecy Act (BSA), which requires institutions to monitor and report suspicious activity. These laws illustrate the tension between privacy rights and government oversight of financial systems.</p><p>We’ll also explain how compliance programs, such as anti-money-laundering efforts, intersect with privacy obligations. On the exam, expect questions about the scope of RFPA protections and the reporting requirements under the BSA. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:25:20 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f798cf6c/93c607c2.mp3" length="64295904" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1606</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Government access to financial data is governed by specific laws. This episode covers the Right to Financial Privacy Act (RFPA), which sets limits on government access to bank records, and the Bank Secrecy Act (BSA), which requires institutions to monitor and report suspicious activity. These laws illustrate the tension between privacy rights and government oversight of financial systems.</p><p>We’ll also explain how compliance programs, such as anti-money-laundering efforts, intersect with privacy obligations. On the exam, expect questions about the scope of RFPA protections and the reporting requirements under the BSA. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f798cf6c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 58 — Communications Access: ECPA, CALEA, and Lawful Intercepts</title>
      <itunes:episode>58</itunes:episode>
      <podcast:episode>58</podcast:episode>
      <itunes:title>Episode 58 — Communications Access: ECPA, CALEA, and Lawful Intercepts</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">35822f0e-983a-416e-8744-e50d7b0b3332</guid>
      <link>https://share.transistor.fm/s/d82fffd2</link>
      <description>
        <![CDATA[<p>Access to communications is one of the most sensitive areas of privacy law. This episode explores the Electronic Communications Privacy Act (ECPA), which regulates wiretaps and stored communications, and the Communications Assistance for Law Enforcement Act (CALEA), which requires telecom providers to enable lawful intercepts. We’ll also highlight how warrants, subpoenas, and court orders function within this framework.</p><p>These laws are frequently tested because they illustrate how privacy protections are balanced with investigative needs. Understanding their structure prepares you for complex exam questions on surveillance and communications privacy. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Access to communications is one of the most sensitive areas of privacy law. This episode explores the Electronic Communications Privacy Act (ECPA), which regulates wiretaps and stored communications, and the Communications Assistance for Law Enforcement Act (CALEA), which requires telecom providers to enable lawful intercepts. We’ll also highlight how warrants, subpoenas, and court orders function within this framework.</p><p>These laws are frequently tested because they illustrate how privacy protections are balanced with investigative needs. Understanding their structure prepares you for complex exam questions on surveillance and communications privacy. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:25:51 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d82fffd2/4f337a62.mp3" length="61670322" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1540</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Access to communications is one of the most sensitive areas of privacy law. This episode explores the Electronic Communications Privacy Act (ECPA), which regulates wiretaps and stored communications, and the Communications Assistance for Law Enforcement Act (CALEA), which requires telecom providers to enable lawful intercepts. We’ll also highlight how warrants, subpoenas, and court orders function within this framework.</p><p>These laws are frequently tested because they illustrate how privacy protections are balanced with investigative needs. Understanding their structure prepares you for complex exam questions on surveillance and communications privacy. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d82fffd2/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 59 — National Security: FISA and Section 702 Surveillance Authorities</title>
      <itunes:episode>59</itunes:episode>
      <podcast:episode>59</podcast:episode>
      <itunes:title>Episode 59 — National Security: FISA and Section 702 Surveillance Authorities</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4fef26da-aa49-4fe1-85dd-93b4aba3cf21</guid>
      <link>https://share.transistor.fm/s/8e1fa53b</link>
      <description>
        <![CDATA[<p>National security laws create unique privacy challenges. This episode introduces the Foreign Intelligence Surveillance Act (FISA) and its Amendments Act, particularly Section 702, which authorizes surveillance of foreign targets. We’ll explain how these authorities intersect with data from U.S. companies and why they raise global privacy concerns.</p><p>We’ll also cover the oversight mechanisms in place, including the Foreign Intelligence Surveillance Court. Exam questions often reference FISA or Section 702, so a clear understanding of their scope and impact is essential. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>National security laws create unique privacy challenges. This episode introduces the Foreign Intelligence Surveillance Act (FISA) and its Amendments Act, particularly Section 702, which authorizes surveillance of foreign targets. We’ll explain how these authorities intersect with data from U.S. companies and why they raise global privacy concerns.</p><p>We’ll also cover the oversight mechanisms in place, including the Foreign Intelligence Surveillance Court. Exam questions often reference FISA or Section 702, so a clear understanding of their scope and impact is essential. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:26:24 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8e1fa53b/f3e16500.mp3" length="61582016" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1538</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>National security laws create unique privacy challenges. This episode introduces the Foreign Intelligence Surveillance Act (FISA) and its Amendments Act, particularly Section 702, which authorizes surveillance of foreign targets. We’ll explain how these authorities intersect with data from U.S. companies and why they raise global privacy concerns.</p><p>We’ll also cover the oversight mechanisms in place, including the Foreign Intelligence Surveillance Court. Exam questions often reference FISA or Section 702, so a clear understanding of their scope and impact is essential. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8e1fa53b/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 60 — USA PATRIOT Act: Expanded Authority for Security Investigations</title>
      <itunes:episode>60</itunes:episode>
      <podcast:episode>60</podcast:episode>
      <itunes:title>Episode 60 — USA PATRIOT Act: Expanded Authority for Security Investigations</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5ced8708-d5f1-44b4-ad96-cd2d1e2684f4</guid>
      <link>https://share.transistor.fm/s/8c7eeaff</link>
      <description>
        <![CDATA[<p>Passed after September 11, the USA PATRIOT Act expanded government surveillance powers. This episode covers how the Act broadened authority for accessing communications, financial records, and other personal data in the name of counterterrorism. We’ll examine key provisions, including roving wiretaps and National Security Letters, and the privacy implications that followed.</p><p>We also discuss how the Act has been reformed and limited over time, including through the USA Freedom Act. For the exam, expect questions that test your ability to connect national security statutes to privacy protections and oversight mechanisms. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Passed after September 11, the USA PATRIOT Act expanded government surveillance powers. This episode covers how the Act broadened authority for accessing communications, financial records, and other personal data in the name of counterterrorism. We’ll examine key provisions, including roving wiretaps and National Security Letters, and the privacy implications that followed.</p><p>We also discuss how the Act has been reformed and limited over time, including through the USA Freedom Act. For the exam, expect questions that test your ability to connect national security statutes to privacy protections and oversight mechanisms. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:27:01 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8c7eeaff/484129aa.mp3" length="61196094" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1529</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Passed after September 11, the USA PATRIOT Act expanded government surveillance powers. This episode covers how the Act broadened authority for accessing communications, financial records, and other personal data in the name of counterterrorism. We’ll examine key provisions, including roving wiretaps and National Security Letters, and the privacy implications that followed.</p><p>We also discuss how the Act has been reformed and limited over time, including through the USA Freedom Act. For the exam, expect questions that test your ability to connect national security statutes to privacy protections and oversight mechanisms. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8c7eeaff/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 61 — USA Freedom Act: Reforms to Bulk Collection</title>
      <itunes:episode>61</itunes:episode>
      <podcast:episode>61</podcast:episode>
      <itunes:title>Episode 61 — USA Freedom Act: Reforms to Bulk Collection</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4437a5fb-c75f-4e5b-b01b-81173d76d626</guid>
      <link>https://share.transistor.fm/s/18cbc923</link>
      <description>
        <![CDATA[<p>This episode covers the USA Freedom Act of 2015, which curtailed some of the sweeping surveillance authorities established under the USA PATRIOT Act. We’ll review how the Act ended bulk collection of telephone metadata by the National Security Agency, replacing it with a more targeted system requiring judicial approval. The reforms reflected public and international concerns over government surveillance practices revealed in prior disclosures.</p><p>We’ll also examine how the Act balances national security needs with civil liberties and privacy protections, particularly through oversight and transparency provisions. For the exam, expect questions that test your understanding of how reforms modified prior surveillance authorities. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers the USA Freedom Act of 2015, which curtailed some of the sweeping surveillance authorities established under the USA PATRIOT Act. We’ll review how the Act ended bulk collection of telephone metadata by the National Security Agency, replacing it with a more targeted system requiring judicial approval. The reforms reflected public and international concerns over government surveillance practices revealed in prior disclosures.</p><p>We’ll also examine how the Act balances national security needs with civil liberties and privacy protections, particularly through oversight and transparency provisions. For the exam, expect questions that test your understanding of how reforms modified prior surveillance authorities. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:27:33 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/18cbc923/975944b7.mp3" length="63359894" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1583</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers the USA Freedom Act of 2015, which curtailed some of the sweeping surveillance authorities established under the USA PATRIOT Act. We’ll review how the Act ended bulk collection of telephone metadata by the National Security Agency, replacing it with a more targeted system requiring judicial approval. The reforms reflected public and international concerns over government surveillance practices revealed in prior disclosures.</p><p>We’ll also examine how the Act balances national security needs with civil liberties and privacy protections, particularly through oversight and transparency provisions. For the exam, expect questions that test your understanding of how reforms modified prior surveillance authorities. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/18cbc923/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 62 — CISA: Cybersecurity Information Sharing and Liability Protections</title>
      <itunes:episode>62</itunes:episode>
      <podcast:episode>62</podcast:episode>
      <itunes:title>Episode 62 — CISA: Cybersecurity Information Sharing and Liability Protections</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">13363387-0c18-4ae0-ae44-3b3bdf988443</guid>
      <link>https://share.transistor.fm/s/f16044db</link>
      <description>
        <![CDATA[<p>The Cybersecurity Information Sharing Act (CISA) encourages private companies to share cyber threat information with the government. This episode explains how the Act provides liability protections for organizations that participate, while also imposing requirements to remove personal information where possible. We’ll explore how CISA fits into the broader privacy landscape, where national security, cybersecurity, and individual rights intersect.</p><p>We also discuss why liability protections were necessary to incentivize information sharing, and how the Act raises ongoing questions about safeguards for personal data. Exam questions may reference CISA in the context of government access or incident response. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The Cybersecurity Information Sharing Act (CISA) encourages private companies to share cyber threat information with the government. This episode explains how the Act provides liability protections for organizations that participate, while also imposing requirements to remove personal information where possible. We’ll explore how CISA fits into the broader privacy landscape, where national security, cybersecurity, and individual rights intersect.</p><p>We also discuss why liability protections were necessary to incentivize information sharing, and how the Act raises ongoing questions about safeguards for personal data. Exam questions may reference CISA in the context of government access or incident response. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:28:10 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f16044db/ecc4b2db.mp3" length="63917698" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1597</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The Cybersecurity Information Sharing Act (CISA) encourages private companies to share cyber threat information with the government. This episode explains how the Act provides liability protections for organizations that participate, while also imposing requirements to remove personal information where possible. We’ll explore how CISA fits into the broader privacy landscape, where national security, cybersecurity, and individual rights intersect.</p><p>We also discuss why liability protections were necessary to incentivize information sharing, and how the Act raises ongoing questions about safeguards for personal data. Exam questions may reference CISA in the context of government access or incident response. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f16044db/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 63 — Media Protections: Privacy Protection Act and Compelled Disclosure</title>
      <itunes:episode>63</itunes:episode>
      <podcast:episode>63</podcast:episode>
      <itunes:title>Episode 63 — Media Protections: Privacy Protection Act and Compelled Disclosure</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">20f5adc0-4dd8-4dcb-b1f4-fc59b70ed972</guid>
      <link>https://share.transistor.fm/s/6f09aa5f</link>
      <description>
        <![CDATA[<p>Media and journalism face unique privacy issues when government seeks access to information. This episode covers the Privacy Protection Act of 1980, which restricts government searches and seizures of media materials. We’ll explore how this law protects journalists from compelled disclosure and balances press freedom with law enforcement needs.</p><p>We’ll also discuss exceptions and court interpretations that shape its application. For exam purposes, focus on the Act’s scope, who is covered, and the limited circumstances where government access is permitted. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Media and journalism face unique privacy issues when government seeks access to information. This episode covers the Privacy Protection Act of 1980, which restricts government searches and seizures of media materials. We’ll explore how this law protects journalists from compelled disclosure and balances press freedom with law enforcement needs.</p><p>We’ll also discuss exceptions and court interpretations that shape its application. For exam purposes, focus on the Act’s scope, who is covered, and the limited circumstances where government access is permitted. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:28:48 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6f09aa5f/c6bf012f.mp3" length="56076420" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1401</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Media and journalism face unique privacy issues when government seeks access to information. This episode covers the Privacy Protection Act of 1980, which restricts government searches and seizures of media materials. We’ll explore how this law protects journalists from compelled disclosure and balances press freedom with law enforcement needs.</p><p>We’ll also discuss exceptions and court interpretations that shape its application. For exam purposes, focus on the Act’s scope, who is covered, and the limited circumstances where government access is permitted. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6f09aa5f/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 64 — E-Discovery: Managing Personal Data in Civil Litigation</title>
      <itunes:episode>64</itunes:episode>
      <podcast:episode>64</podcast:episode>
      <itunes:title>Episode 64 — E-Discovery: Managing Personal Data in Civil Litigation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4b75f0e0-fe19-4ace-8de5-89929ee6fe45</guid>
      <link>https://share.transistor.fm/s/e863cf30</link>
      <description>
        <![CDATA[<p>Civil litigation often requires the disclosure of large volumes of data, raising significant privacy concerns. This episode explains the role of electronic discovery (e-discovery), including how personal information is identified, reviewed, and produced during legal proceedings. We’ll cover how protective orders, redaction, and anonymization techniques help mitigate risks.</p><p>We also explore how U.S. discovery obligations sometimes conflict with international data protection laws, creating complex compliance challenges. Exam questions may reference e-discovery in the context of multinational conflicts or civil litigation. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Civil litigation often requires the disclosure of large volumes of data, raising significant privacy concerns. This episode explains the role of electronic discovery (e-discovery), including how personal information is identified, reviewed, and produced during legal proceedings. We’ll cover how protective orders, redaction, and anonymization techniques help mitigate risks.</p><p>We also explore how U.S. discovery obligations sometimes conflict with international data protection laws, creating complex compliance challenges. Exam questions may reference e-discovery in the context of multinational conflicts or civil litigation. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:29:20 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e863cf30/664ddb99.mp3" length="62921198" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1572</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Civil litigation often requires the disclosure of large volumes of data, raising significant privacy concerns. This episode explains the role of electronic discovery (e-discovery), including how personal information is identified, reviewed, and produced during legal proceedings. We’ll cover how protective orders, redaction, and anonymization techniques help mitigate risks.</p><p>We also explore how U.S. discovery obligations sometimes conflict with international data protection laws, creating complex compliance challenges. Exam questions may reference e-discovery in the context of multinational conflicts or civil litigation. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e863cf30/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 65 — Domain IV Overview: Employment Privacy from Hiring to Termination</title>
      <itunes:episode>65</itunes:episode>
      <podcast:episode>65</podcast:episode>
      <itunes:title>Episode 65 — Domain IV Overview: Employment Privacy from Hiring to Termination</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c5308169-f42e-4805-a2b5-6e8dc0ed8adc</guid>
      <link>https://share.transistor.fm/s/6ba1ecca</link>
      <description>
        <![CDATA[<p>Domain IV addresses privacy issues throughout the employment lifecycle. This episode provides an overview of pre-employment screening, workplace monitoring, and post-employment records retention. We’ll highlight the key statutes and agencies that regulate employment privacy, including the Civil Rights Act, the Americans with Disabilities Act, and the Equal Employment Opportunity Commission.</p><p>We also explore how employment privacy intersects with technology, such as monitoring software, biometrics, and AI-driven hiring tools. For the exam, this overview provides the foundation for detailed episodes on specific employment privacy topics. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Domain IV addresses privacy issues throughout the employment lifecycle. This episode provides an overview of pre-employment screening, workplace monitoring, and post-employment records retention. We’ll highlight the key statutes and agencies that regulate employment privacy, including the Civil Rights Act, the Americans with Disabilities Act, and the Equal Employment Opportunity Commission.</p><p>We also explore how employment privacy intersects with technology, such as monitoring software, biometrics, and AI-driven hiring tools. For the exam, this overview provides the foundation for detailed episodes on specific employment privacy topics. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:29:51 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6ba1ecca/12301216.mp3" length="63407938" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1584</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Domain IV addresses privacy issues throughout the employment lifecycle. This episode provides an overview of pre-employment screening, workplace monitoring, and post-employment records retention. We’ll highlight the key statutes and agencies that regulate employment privacy, including the Civil Rights Act, the Americans with Disabilities Act, and the Equal Employment Opportunity Commission.</p><p>We also explore how employment privacy intersects with technology, such as monitoring software, biometrics, and AI-driven hiring tools. For the exam, this overview provides the foundation for detailed episodes on specific employment privacy topics. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6ba1ecca/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 66 — Workplace Privacy Concepts: Notice, Expectation, and Anti-Discrimination</title>
      <itunes:episode>66</itunes:episode>
      <podcast:episode>66</podcast:episode>
      <itunes:title>Episode 66 — Workplace Privacy Concepts: Notice, Expectation, and Anti-Discrimination</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4c8109b0-248c-4276-8218-d170314b3be0</guid>
      <link>https://share.transistor.fm/s/652640c8</link>
      <description>
        <![CDATA[<p>Workplace privacy is grounded in concepts of notice, reasonable expectation of privacy, and nondiscrimination. This episode examines how employers must provide clear notice of monitoring practices, and how courts evaluate whether employees reasonably expected privacy in various contexts. Anti-discrimination laws add another layer of protection, preventing misuse of personal data in hiring, promotion, or workplace decisions.</p><p>We’ll also discuss how these concepts evolve with technology, such as remote work and digital monitoring tools. Exam scenarios often test your ability to apply workplace privacy principles to real-world situations. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Workplace privacy is grounded in concepts of notice, reasonable expectation of privacy, and nondiscrimination. This episode examines how employers must provide clear notice of monitoring practices, and how courts evaluate whether employees reasonably expected privacy in various contexts. Anti-discrimination laws add another layer of protection, preventing misuse of personal data in hiring, promotion, or workplace decisions.</p><p>We’ll also discuss how these concepts evolve with technology, such as remote work and digital monitoring tools. Exam scenarios often test your ability to apply workplace privacy principles to real-world situations. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:30:22 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/652640c8/865aa2b2.mp3" length="60605712" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1514</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Workplace privacy is grounded in concepts of notice, reasonable expectation of privacy, and nondiscrimination. This episode examines how employers must provide clear notice of monitoring practices, and how courts evaluate whether employees reasonably expected privacy in various contexts. Anti-discrimination laws add another layer of protection, preventing misuse of personal data in hiring, promotion, or workplace decisions.</p><p>We’ll also discuss how these concepts evolve with technology, such as remote work and digital monitoring tools. Exam scenarios often test your ability to apply workplace privacy principles to real-world situations. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/652640c8/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 67 — Federal Agencies: FTC, DOL, EEOC, NLRB, and OSHA Roles</title>
      <itunes:episode>67</itunes:episode>
      <podcast:episode>67</podcast:episode>
      <itunes:title>Episode 67 — Federal Agencies: FTC, DOL, EEOC, NLRB, and OSHA Roles</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">298d3350-14c6-4530-a697-fadf2a7de2b4</guid>
      <link>https://share.transistor.fm/s/a69bd96b</link>
      <description>
        <![CDATA[<p>Multiple federal agencies shape employment privacy. This episode covers the Federal Trade Commission’s oversight of data security promises, the Department of Labor’s authority over wage and hour records, the Equal Employment Opportunity Commission’s enforcement of anti-discrimination laws, the National Labor Relations Board’s protection of concerted activity, and the Occupational Safety and Health Administration’s focus on workplace safety and reporting.</p><p>We’ll highlight how each agency’s jurisdiction intersects with privacy issues, creating a web of obligations for employers. Understanding these roles is essential for exam success, as many questions test knowledge of agency responsibilities. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Multiple federal agencies shape employment privacy. This episode covers the Federal Trade Commission’s oversight of data security promises, the Department of Labor’s authority over wage and hour records, the Equal Employment Opportunity Commission’s enforcement of anti-discrimination laws, the National Labor Relations Board’s protection of concerted activity, and the Occupational Safety and Health Administration’s focus on workplace safety and reporting.</p><p>We’ll highlight how each agency’s jurisdiction intersects with privacy issues, creating a web of obligations for employers. Understanding these roles is essential for exam success, as many questions test knowledge of agency responsibilities. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:35:14 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a69bd96b/367a26c6.mp3" length="59179116" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1478</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Multiple federal agencies shape employment privacy. This episode covers the Federal Trade Commission’s oversight of data security promises, the Department of Labor’s authority over wage and hour records, the Equal Employment Opportunity Commission’s enforcement of anti-discrimination laws, the National Labor Relations Board’s protection of concerted activity, and the Occupational Safety and Health Administration’s focus on workplace safety and reporting.</p><p>We’ll highlight how each agency’s jurisdiction intersects with privacy issues, creating a web of obligations for employers. Understanding these roles is essential for exam success, as many questions test knowledge of agency responsibilities. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a69bd96b/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 68 — Pre-Employment Tools: AI Hiring and Bias Mitigation</title>
      <itunes:episode>68</itunes:episode>
      <podcast:episode>68</podcast:episode>
      <itunes:title>Episode 68 — Pre-Employment Tools: AI Hiring and Bias Mitigation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c399e736-d02b-4de3-9a38-781b5df4719e</guid>
      <link>https://share.transistor.fm/s/7bcd8aff</link>
      <description>
        <![CDATA[<p>Employers increasingly use AI-driven tools for hiring, but these technologies raise privacy and fairness concerns. This episode explains how automated decision-making tools are regulated, including requirements for transparency, bias audits, and applicant rights. We’ll also explore how these tools intersect with anti-discrimination laws and state AI regulations.</p><p>Understanding these risks and obligations is critical for exam preparation, as scenarios may involve evaluating compliance of hiring practices with privacy and employment laws. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Employers increasingly use AI-driven tools for hiring, but these technologies raise privacy and fairness concerns. This episode explains how automated decision-making tools are regulated, including requirements for transparency, bias audits, and applicant rights. We’ll also explore how these tools intersect with anti-discrimination laws and state AI regulations.</p><p>Understanding these risks and obligations is critical for exam preparation, as scenarios may involve evaluating compliance of hiring practices with privacy and employment laws. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:35:51 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7bcd8aff/14d330d9.mp3" length="57331110" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1432</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Employers increasingly use AI-driven tools for hiring, but these technologies raise privacy and fairness concerns. This episode explains how automated decision-making tools are regulated, including requirements for transparency, bias audits, and applicant rights. We’ll also explore how these tools intersect with anti-discrimination laws and state AI regulations.</p><p>Understanding these risks and obligations is critical for exam preparation, as scenarios may involve evaluating compliance of hiring practices with privacy and employment laws. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7bcd8aff/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 69 — Background Screening: Psychological Tests, Polygraphs, and Drug Testing</title>
      <itunes:episode>69</itunes:episode>
      <podcast:episode>69</podcast:episode>
      <itunes:title>Episode 69 — Background Screening: Psychological Tests, Polygraphs, and Drug Testing</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0ab02d78-677e-4d0c-ab7b-c3b2ecea3e08</guid>
      <link>https://share.transistor.fm/s/913e127c</link>
      <description>
        <![CDATA[<p>Employers often rely on background screening to evaluate candidates, but privacy laws set clear limits. This episode examines psychological and integrity tests, restrictions on polygraph testing under the Employee Polygraph Protection Act, and the privacy considerations in drug and alcohol testing. We’ll also discuss how the Fair Credit Reporting Act applies to third-party background checks.</p><p>These screening tools highlight the balance between employer needs and applicant rights. For exam purposes, focus on legal boundaries, notice requirements, and candidate consent obligations. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Employers often rely on background screening to evaluate candidates, but privacy laws set clear limits. This episode examines psychological and integrity tests, restrictions on polygraph testing under the Employee Polygraph Protection Act, and the privacy considerations in drug and alcohol testing. We’ll also discuss how the Fair Credit Reporting Act applies to third-party background checks.</p><p>These screening tools highlight the balance between employer needs and applicant rights. For exam purposes, focus on legal boundaries, notice requirements, and candidate consent obligations. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:36:24 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/913e127c/ad444828.mp3" length="55514830" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1387</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Employers often rely on background screening to evaluate candidates, but privacy laws set clear limits. This episode examines psychological and integrity tests, restrictions on polygraph testing under the Employee Polygraph Protection Act, and the privacy considerations in drug and alcohol testing. We’ll also discuss how the Fair Credit Reporting Act applies to third-party background checks.</p><p>These screening tools highlight the balance between employer needs and applicant rights. For exam purposes, focus on legal boundaries, notice requirements, and candidate consent obligations. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/913e127c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 70 — Social Media Monitoring: Policies and Union Considerations</title>
      <itunes:episode>70</itunes:episode>
      <podcast:episode>70</podcast:episode>
      <itunes:title>Episode 70 — Social Media Monitoring: Policies and Union Considerations</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e12b7236-cba7-4a29-8ac0-830c6ef2d8c1</guid>
      <link>https://share.transistor.fm/s/084e4809</link>
      <description>
        <![CDATA[<p>Employers increasingly monitor social media use, both during hiring and employment. This episode explores the privacy risks, including potential discrimination, reputational harm, and conflicts with labor rights. We’ll examine how the National Labor Relations Board protects “concerted activity” on social platforms, limiting how employers can respond to employee posts.</p><p>We’ll also cover best practices, such as clear policies and limited use of social media in employment decisions. Exam questions may test your ability to analyze employer practices in light of both privacy and labor law. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Employers increasingly monitor social media use, both during hiring and employment. This episode explores the privacy risks, including potential discrimination, reputational harm, and conflicts with labor rights. We’ll examine how the National Labor Relations Board protects “concerted activity” on social platforms, limiting how employers can respond to employee posts.</p><p>We’ll also cover best practices, such as clear policies and limited use of social media in employment decisions. Exam questions may test your ability to analyze employer practices in light of both privacy and labor law. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:37:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/084e4809/8881e1c7.mp3" length="55044404" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1375</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Employers increasingly monitor social media use, both during hiring and employment. This episode explores the privacy risks, including potential discrimination, reputational harm, and conflicts with labor rights. We’ll examine how the National Labor Relations Board protects “concerted activity” on social platforms, limiting how employers can respond to employee posts.</p><p>We’ll also cover best practices, such as clear policies and limited use of social media in employment decisions. Exam questions may test your ability to analyze employer practices in light of both privacy and labor law. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/084e4809/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 71 — Employee Monitoring: Computers, Email, Phone, and Video</title>
      <itunes:episode>71</itunes:episode>
      <podcast:episode>71</podcast:episode>
      <itunes:title>Episode 71 — Employee Monitoring: Computers, Email, Phone, and Video</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fd0a1c55-50ed-44dd-93e8-dfd9dfcbd74e</guid>
      <link>https://share.transistor.fm/s/8c46e111</link>
      <description>
        <![CDATA[<p>Employers often monitor employees’ use of technology and communications systems, raising important privacy issues. This episode examines the scope of monitoring activities, including computer usage, email systems, telephone records, and workplace video surveillance. We’ll explain how notice and consent play central roles in shaping the legality of these practices, as well as the expectations courts use when balancing employer interests with employee rights. These monitoring tools highlight the trade-offs between productivity, security, and individual privacy.</p><p>We also discuss how agencies and statutes regulate monitoring, including the Electronic Communications Privacy Act and labor laws that protect certain employee activities. Employers must ensure their policies are clear, narrowly tailored, and compliant with applicable laws. Exam questions may test your ability to distinguish permissible monitoring from overreach, making this a key area of preparation. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Employers often monitor employees’ use of technology and communications systems, raising important privacy issues. This episode examines the scope of monitoring activities, including computer usage, email systems, telephone records, and workplace video surveillance. We’ll explain how notice and consent play central roles in shaping the legality of these practices, as well as the expectations courts use when balancing employer interests with employee rights. These monitoring tools highlight the trade-offs between productivity, security, and individual privacy.</p><p>We also discuss how agencies and statutes regulate monitoring, including the Electronic Communications Privacy Act and labor laws that protect certain employee activities. Employers must ensure their policies are clear, narrowly tailored, and compliant with applicable laws. Exam questions may test your ability to distinguish permissible monitoring from overreach, making this a key area of preparation. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:37:34 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8c46e111/d13aea0b.mp3" length="57321518" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1432</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Employers often monitor employees’ use of technology and communications systems, raising important privacy issues. This episode examines the scope of monitoring activities, including computer usage, email systems, telephone records, and workplace video surveillance. We’ll explain how notice and consent play central roles in shaping the legality of these practices, as well as the expectations courts use when balancing employer interests with employee rights. These monitoring tools highlight the trade-offs between productivity, security, and individual privacy.</p><p>We also discuss how agencies and statutes regulate monitoring, including the Electronic Communications Privacy Act and labor laws that protect certain employee activities. Employers must ensure their policies are clear, narrowly tailored, and compliant with applicable laws. Exam questions may test your ability to distinguish permissible monitoring from overreach, making this a key area of preparation. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8c46e111/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 72 — Biometrics and Location: LBS, Wearables, and Wellness Programs</title>
      <itunes:episode>72</itunes:episode>
      <podcast:episode>72</podcast:episode>
      <itunes:title>Episode 72 — Biometrics and Location: LBS, Wearables, and Wellness Programs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ab46ab3a-9b72-4021-929f-8fe5b573b1e7</guid>
      <link>https://share.transistor.fm/s/9d2c00b5</link>
      <description>
        <![CDATA[<p>Biometric data and location-based services present unique privacy challenges in the workplace. This episode reviews how employers use tools like fingerprint scanners, facial recognition, GPS tracking, and wearable devices to monitor attendance, productivity, and health. We’ll cover the privacy risks, consent requirements, and the patchwork of state laws, such as Illinois’ Biometric Information Privacy Act (BIPA), that impose specific obligations.</p><p>We’ll also look at wellness programs and the sensitive data they generate, including health metrics and activity tracking. For exam purposes, focus on where biometric and location data receive heightened protections, and how these rules affect employer practices. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Biometric data and location-based services present unique privacy challenges in the workplace. This episode reviews how employers use tools like fingerprint scanners, facial recognition, GPS tracking, and wearable devices to monitor attendance, productivity, and health. We’ll cover the privacy risks, consent requirements, and the patchwork of state laws, such as Illinois’ Biometric Information Privacy Act (BIPA), that impose specific obligations.</p><p>We’ll also look at wellness programs and the sensitive data they generate, including health metrics and activity tracking. For exam purposes, focus on where biometric and location data receive heightened protections, and how these rules affect employer practices. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:38:09 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9d2c00b5/ee19eee7.mp3" length="56673532" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1415</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Biometric data and location-based services present unique privacy challenges in the workplace. This episode reviews how employers use tools like fingerprint scanners, facial recognition, GPS tracking, and wearable devices to monitor attendance, productivity, and health. We’ll cover the privacy risks, consent requirements, and the patchwork of state laws, such as Illinois’ Biometric Information Privacy Act (BIPA), that impose specific obligations.</p><p>We’ll also look at wellness programs and the sensitive data they generate, including health metrics and activity tracking. For exam purposes, focus on where biometric and location data receive heightened protections, and how these rules affect employer practices. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9d2c00b5/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 73 — Internal Investigations: Misconduct, Documentation, and Handling</title>
      <itunes:episode>73</itunes:episode>
      <podcast:episode>73</podcast:episode>
      <itunes:title>Episode 73 — Internal Investigations: Misconduct, Documentation, and Handling</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2c89ca9e-81ca-4105-a95a-aaa6d44d3f84</guid>
      <link>https://share.transistor.fm/s/9633c992</link>
      <description>
        <![CDATA[<p>Organizations must often conduct internal investigations into employee misconduct, which involves significant privacy considerations. This episode explores how investigations collect and handle personal information, including interviews, system logs, and third-party services. We’ll discuss the importance of documenting evidence while respecting the rights of the individuals involved.</p><p>We’ll also highlight how confidentiality and fairness shape investigative practices, and how regulators may review the process in cases of disputes or enforcement actions. Exam scenarios often test your ability to balance investigative needs with privacy obligations, making this an essential area to master. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Organizations must often conduct internal investigations into employee misconduct, which involves significant privacy considerations. This episode explores how investigations collect and handle personal information, including interviews, system logs, and third-party services. We’ll discuss the importance of documenting evidence while respecting the rights of the individuals involved.</p><p>We’ll also highlight how confidentiality and fairness shape investigative practices, and how regulators may review the process in cases of disputes or enforcement actions. Exam scenarios often test your ability to balance investigative needs with privacy obligations, making this an essential area to master. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:38:39 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9633c992/a734da38.mp3" length="57005696" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1424</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Organizations must often conduct internal investigations into employee misconduct, which involves significant privacy considerations. This episode explores how investigations collect and handle personal information, including interviews, system logs, and third-party services. We’ll discuss the importance of documenting evidence while respecting the rights of the individuals involved.</p><p>We’ll also highlight how confidentiality and fairness shape investigative practices, and how regulators may review the process in cases of disputes or enforcement actions. Exam scenarios often test your ability to balance investigative needs with privacy obligations, making this an essential area to master. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9633c992/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 74 — ECPA at Work: Employer Obligations and Exceptions</title>
      <itunes:episode>74</itunes:episode>
      <podcast:episode>74</podcast:episode>
      <itunes:title>Episode 74 — ECPA at Work: Employer Obligations and Exceptions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">66caa173-48ac-47d4-892f-008b7b21105c</guid>
      <link>https://share.transistor.fm/s/6e3d956c</link>
      <description>
        <![CDATA[<p>The Electronic Communications Privacy Act (ECPA) plays a major role in regulating workplace privacy. This episode explains how the Act governs the interception and access of electronic communications, including email and phone calls, in the employment context. We’ll cover key exceptions that permit monitoring, such as the consent of at least one party or business-use exceptions.</p><p>We’ll also examine how courts interpret ECPA in workplace disputes, shaping what employers may lawfully monitor. Understanding ECPA at work is critical for analyzing exam questions that deal with employee communications and privacy expectations. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The Electronic Communications Privacy Act (ECPA) plays a major role in regulating workplace privacy. This episode explains how the Act governs the interception and access of electronic communications, including email and phone calls, in the employment context. We’ll cover key exceptions that permit monitoring, such as the consent of at least one party or business-use exceptions.</p><p>We’ll also examine how courts interpret ECPA in workplace disputes, shaping what employers may lawfully monitor. Understanding ECPA at work is critical for analyzing exam questions that deal with employee communications and privacy expectations. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:39:09 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6e3d956c/b0da2152.mp3" length="55800866" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1394</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The Electronic Communications Privacy Act (ECPA) plays a major role in regulating workplace privacy. This episode explains how the Act governs the interception and access of electronic communications, including email and phone calls, in the employment context. We’ll cover key exceptions that permit monitoring, such as the consent of at least one party or business-use exceptions.</p><p>We’ll also examine how courts interpret ECPA in workplace disputes, shaping what employers may lawfully monitor. Understanding ECPA at work is critical for analyzing exam questions that deal with employee communications and privacy expectations. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6e3d956c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 75 — Post-Employment: Records, References, and Retention Duties</title>
      <itunes:episode>75</itunes:episode>
      <podcast:episode>75</podcast:episode>
      <itunes:title>Episode 75 — Post-Employment: Records, References, and Retention Duties</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">937fb4ff-ce94-4152-873f-3165a756134a</guid>
      <link>https://share.transistor.fm/s/695de851</link>
      <description>
        <![CDATA[<p>Privacy obligations continue even after employment ends. This episode reviews how employers manage personnel records after termination, including requirements for retention and eventual disposal. We’ll also cover privacy issues in providing references, balancing truthfulness with obligations to protect sensitive information.</p><p>We’ll discuss how state and federal rules shape post-employment practices, and how retention duties must be coordinated with legal holds or compliance requirements. Exam questions may test your ability to apply privacy principles beyond the active employment relationship. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Privacy obligations continue even after employment ends. This episode reviews how employers manage personnel records after termination, including requirements for retention and eventual disposal. We’ll also cover privacy issues in providing references, balancing truthfulness with obligations to protect sensitive information.</p><p>We’ll discuss how state and federal rules shape post-employment practices, and how retention duties must be coordinated with legal holds or compliance requirements. Exam questions may test your ability to apply privacy principles beyond the active employment relationship. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:39:42 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/695de851/a7277def.mp3" length="56801204" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1419</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Privacy obligations continue even after employment ends. This episode reviews how employers manage personnel records after termination, including requirements for retention and eventual disposal. We’ll also cover privacy issues in providing references, balancing truthfulness with obligations to protect sensitive information.</p><p>We’ll discuss how state and federal rules shape post-employment practices, and how retention duties must be coordinated with legal holds or compliance requirements. Exam questions may test your ability to apply privacy principles beyond the active employment relationship. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/695de851/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 76 — Domain V Overview: Role of States in the U.S. Privacy Framework</title>
      <itunes:episode>76</itunes:episode>
      <podcast:episode>76</podcast:episode>
      <itunes:title>Episode 76 — Domain V Overview: Role of States in the U.S. Privacy Framework</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b4b07488-8005-43a7-86c2-a9219a8dd654</guid>
      <link>https://share.transistor.fm/s/80bad2fd</link>
      <description>
        <![CDATA[<p>Domain V introduces state privacy laws, which increasingly shape the U.S. privacy landscape. This episode provides an overview of how state authority interacts with federal law, highlighting the roles of state attorneys general, legislatures, and agencies like the California Privacy Protection Agency. We’ll also discuss how states serve as “laboratories of democracy,” pioneering comprehensive privacy frameworks where federal law remains sectoral.</p><p>By mastering Domain V, you’ll gain the tools to analyze key state statutes, exemptions, and enforcement provisions. This foundation prepares you for the detailed state-level topics that follow in subsequent episodes. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Domain V introduces state privacy laws, which increasingly shape the U.S. privacy landscape. This episode provides an overview of how state authority interacts with federal law, highlighting the roles of state attorneys general, legislatures, and agencies like the California Privacy Protection Agency. We’ll also discuss how states serve as “laboratories of democracy,” pioneering comprehensive privacy frameworks where federal law remains sectoral.</p><p>By mastering Domain V, you’ll gain the tools to analyze key state statutes, exemptions, and enforcement provisions. This foundation prepares you for the detailed state-level topics that follow in subsequent episodes. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:40:14 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/80bad2fd/e6a8d74c.mp3" length="55975614" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1398</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Domain V introduces state privacy laws, which increasingly shape the U.S. privacy landscape. This episode provides an overview of how state authority interacts with federal law, highlighting the roles of state attorneys general, legislatures, and agencies like the California Privacy Protection Agency. We’ll also discuss how states serve as “laboratories of democracy,” pioneering comprehensive privacy frameworks where federal law remains sectoral.</p><p>By mastering Domain V, you’ll gain the tools to analyze key state statutes, exemptions, and enforcement provisions. This foundation prepares you for the detailed state-level topics that follow in subsequent episodes. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/80bad2fd/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 77 — State Authority: Attorneys General and CPPA Oversight</title>
      <itunes:episode>77</itunes:episode>
      <podcast:episode>77</podcast:episode>
      <itunes:title>Episode 77 — State Authority: Attorneys General and CPPA Oversight</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c9d67315-220a-4f29-9b2d-7fbd8216dadb</guid>
      <link>https://share.transistor.fm/s/f17f537a</link>
      <description>
        <![CDATA[<p>State enforcement has become increasingly influential in privacy regulation. This episode examines the role of state attorneys general, who bring actions under both state privacy laws and general consumer protection statutes. We’ll also focus on the California Privacy Protection Agency, which has broad authority under the CCPA and CPRA to issue regulations and enforce compliance.</p><p>We’ll highlight how these authorities shape enforcement priorities and often act as models for other states. For the exam, pay close attention to how state-level oversight differs from federal enforcement, as this is a common theme in scenario questions. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>State enforcement has become increasingly influential in privacy regulation. This episode examines the role of state attorneys general, who bring actions under both state privacy laws and general consumer protection statutes. We’ll also focus on the California Privacy Protection Agency, which has broad authority under the CCPA and CPRA to issue regulations and enforce compliance.</p><p>We’ll highlight how these authorities shape enforcement priorities and often act as models for other states. For the exam, pay close attention to how state-level oversight differs from federal enforcement, as this is a common theme in scenario questions. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:40:47 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f17f537a/06e2d3cf.mp3" length="55207594" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1379</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>State enforcement has become increasingly influential in privacy regulation. This episode examines the role of state attorneys general, who bring actions under both state privacy laws and general consumer protection statutes. We’ll also focus on the California Privacy Protection Agency, which has broad authority under the CCPA and CPRA to issue regulations and enforce compliance.</p><p>We’ll highlight how these authorities shape enforcement priorities and often act as models for other states. For the exam, pay close attention to how state-level oversight differs from federal enforcement, as this is a common theme in scenario questions. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f17f537a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 78 — Applicability Tests: Resident Thresholds, Revenue, and Exemptions</title>
      <itunes:episode>78</itunes:episode>
      <podcast:episode>78</podcast:episode>
      <itunes:title>Episode 78 — Applicability Tests: Resident Thresholds, Revenue, and Exemptions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">55ee8c1f-56d3-4032-ac7e-a57c2e0512e1</guid>
      <link>https://share.transistor.fm/s/2c701863</link>
      <description>
        <![CDATA[<p>Comprehensive state privacy laws often hinge on applicability thresholds. This episode explores the criteria that determine whether a business must comply, such as number of state residents, annual revenue, or percentage of revenue from selling personal information. We’ll also cover common exemptions, including nonprofit entities, small businesses, and data already regulated under federal statutes.</p><p>Understanding these thresholds is vital, as they define the scope of compliance obligations. Exam questions may present hypothetical businesses and ask you to determine whether state privacy laws apply—making this topic especially important. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Comprehensive state privacy laws often hinge on applicability thresholds. This episode explores the criteria that determine whether a business must comply, such as number of state residents, annual revenue, or percentage of revenue from selling personal information. We’ll also cover common exemptions, including nonprofit entities, small businesses, and data already regulated under federal statutes.</p><p>Understanding these thresholds is vital, as they define the scope of compliance obligations. Exam questions may present hypothetical businesses and ask you to determine whether state privacy laws apply—making this topic especially important. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:41:24 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2c701863/43ac60be.mp3" length="52054018" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1300</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Comprehensive state privacy laws often hinge on applicability thresholds. This episode explores the criteria that determine whether a business must comply, such as number of state residents, annual revenue, or percentage of revenue from selling personal information. We’ll also cover common exemptions, including nonprofit entities, small businesses, and data already regulated under federal statutes.</p><p>Understanding these thresholds is vital, as they define the scope of compliance obligations. Exam questions may present hypothetical businesses and ask you to determine whether state privacy laws apply—making this topic especially important. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2c701863/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 79 — Data Subject Rights: Access, Deletion, Portability, and Consent</title>
      <itunes:episode>79</itunes:episode>
      <podcast:episode>79</podcast:episode>
      <itunes:title>Episode 79 — Data Subject Rights: Access, Deletion, Portability, and Consent</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">645aa6ea-252c-432e-9282-b04e19ef49d4</guid>
      <link>https://share.transistor.fm/s/38b87f79</link>
      <description>
        <![CDATA[<p>State laws grant individuals a suite of rights over their personal data. This episode explains the rights to access, correct, delete, and port data, as well as opt-out and consent requirements. We’ll highlight how these rights compare across major state frameworks like California’s CCPA/CPRA, Virginia’s CDPA, and Colorado’s Privacy Act.</p><p>We’ll also cover how organizations must respond to rights requests, including timelines, authentication requirements, and appeal mechanisms. For the exam, be ready to recognize which rights apply under which laws and how they align with international standards. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>State laws grant individuals a suite of rights over their personal data. This episode explains the rights to access, correct, delete, and port data, as well as opt-out and consent requirements. We’ll highlight how these rights compare across major state frameworks like California’s CCPA/CPRA, Virginia’s CDPA, and Colorado’s Privacy Act.</p><p>We’ll also cover how organizations must respond to rights requests, including timelines, authentication requirements, and appeal mechanisms. For the exam, be ready to recognize which rights apply under which laws and how they align with international standards. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:41:58 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/38b87f79/f9bc446f.mp3" length="53428734" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1334</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>State laws grant individuals a suite of rights over their personal data. This episode explains the rights to access, correct, delete, and port data, as well as opt-out and consent requirements. We’ll highlight how these rights compare across major state frameworks like California’s CCPA/CPRA, Virginia’s CDPA, and Colorado’s Privacy Act.</p><p>We’ll also cover how organizations must respond to rights requests, including timelines, authentication requirements, and appeal mechanisms. For the exam, be ready to recognize which rights apply under which laws and how they align with international standards. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/38b87f79/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 80 — Privacy Notices: Transparency and Consumer Disclosures</title>
      <itunes:episode>80</itunes:episode>
      <podcast:episode>80</podcast:episode>
      <itunes:title>Episode 80 — Privacy Notices: Transparency and Consumer Disclosures</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fde2dde5-20f2-4557-9cea-3234adaf73be</guid>
      <link>https://share.transistor.fm/s/3518f5fe</link>
      <description>
        <![CDATA[<p>Transparency is a cornerstone of state privacy laws. This episode covers the requirements for privacy notices, including disclosures about data collection, use, sharing, and consumer rights. We’ll examine layered notices, just-in-time disclosures, and special statements for sensitive data or financial incentives.</p><p>We’ll also highlight enforcement trends, where regulators penalize vague or misleading notices. Exam questions frequently test your understanding of notice requirements, so mastering this topic is key to demonstrating competency. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Transparency is a cornerstone of state privacy laws. This episode covers the requirements for privacy notices, including disclosures about data collection, use, sharing, and consumer rights. We’ll examine layered notices, just-in-time disclosures, and special statements for sensitive data or financial incentives.</p><p>We’ll also highlight enforcement trends, where regulators penalize vague or misleading notices. Exam questions frequently test your understanding of notice requirements, so mastering this topic is key to demonstrating competency. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:42:26 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3518f5fe/3ec03e86.mp3" length="52084716" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1301</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Transparency is a cornerstone of state privacy laws. This episode covers the requirements for privacy notices, including disclosures about data collection, use, sharing, and consumer rights. We’ll examine layered notices, just-in-time disclosures, and special statements for sensitive data or financial incentives.</p><p>We’ll also highlight enforcement trends, where regulators penalize vague or misleading notices. Exam questions frequently test your understanding of notice requirements, so mastering this topic is key to demonstrating competency. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3518f5fe/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 81 — Data Protection Agreements: Contracts and Assessments</title>
      <itunes:episode>81</itunes:episode>
      <podcast:episode>81</podcast:episode>
      <itunes:title>Episode 81 — Data Protection Agreements: Contracts and Assessments</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a745c24f-b27d-4be0-91cb-ac1277976143</guid>
      <link>https://share.transistor.fm/s/5b357974</link>
      <description>
        <![CDATA[<p>Contracts are central to ensuring compliance with state privacy laws. This episode explains how data protection agreements define the obligations between controllers and processors, including rules for data use, security, subcontracting, and breach notification. We’ll also review assessment requirements, where organizations must conduct and document evaluations of high-risk data processing activities such as targeted advertising or sensitive data handling.</p><p>We highlight how these agreements and assessments demonstrate accountability and provide evidence of due diligence to regulators. Exam questions often present scenarios where vendor contracts or assessments are incomplete, requiring you to identify compliance gaps. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Contracts are central to ensuring compliance with state privacy laws. This episode explains how data protection agreements define the obligations between controllers and processors, including rules for data use, security, subcontracting, and breach notification. We’ll also review assessment requirements, where organizations must conduct and document evaluations of high-risk data processing activities such as targeted advertising or sensitive data handling.</p><p>We highlight how these agreements and assessments demonstrate accountability and provide evidence of due diligence to regulators. Exam questions often present scenarios where vendor contracts or assessments are incomplete, requiring you to identify compliance gaps. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:42:53 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/5b357974/0ba3c71b.mp3" length="51789994" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1293</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Contracts are central to ensuring compliance with state privacy laws. This episode explains how data protection agreements define the obligations between controllers and processors, including rules for data use, security, subcontracting, and breach notification. We’ll also review assessment requirements, where organizations must conduct and document evaluations of high-risk data processing activities such as targeted advertising or sensitive data handling.</p><p>We highlight how these agreements and assessments demonstrate accountability and provide evidence of due diligence to regulators. Exam questions often present scenarios where vendor contracts or assessments are incomplete, requiring you to identify compliance gaps. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5b357974/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 82 — State Security Requirements: Common Controls Across Jurisdictions</title>
      <itunes:episode>82</itunes:episode>
      <podcast:episode>82</podcast:episode>
      <itunes:title>Episode 82 — State Security Requirements: Common Controls Across Jurisdictions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">28401804-1199-4fb2-953d-38342a870665</guid>
      <link>https://share.transistor.fm/s/a00061a0</link>
      <description>
        <![CDATA[<p>Most state privacy laws include explicit security requirements. This episode reviews common obligations such as implementing reasonable safeguards, risk-based controls, encryption, and access restrictions. While states vary in language, the underlying expectation is that businesses adopt practices proportional to the sensitivity of data.</p><p>We’ll also cover how state security requirements overlap with federal standards like the FTC’s unfairness authority and the GLBA Safeguards Rule. For the exam, pay attention to how “reasonable security” is defined and applied, as questions often test your ability to analyze what qualifies under different frameworks. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Most state privacy laws include explicit security requirements. This episode reviews common obligations such as implementing reasonable safeguards, risk-based controls, encryption, and access restrictions. While states vary in language, the underlying expectation is that businesses adopt practices proportional to the sensitivity of data.</p><p>We’ll also cover how state security requirements overlap with federal standards like the FTC’s unfairness authority and the GLBA Safeguards Rule. For the exam, pay attention to how “reasonable security” is defined and applied, as questions often test your ability to analyze what qualifies under different frameworks. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:43:22 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a00061a0/ffc2efba.mp3" length="53074498" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1326</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Most state privacy laws include explicit security requirements. This episode reviews common obligations such as implementing reasonable safeguards, risk-based controls, encryption, and access restrictions. While states vary in language, the underlying expectation is that businesses adopt practices proportional to the sensitivity of data.</p><p>We’ll also cover how state security requirements overlap with federal standards like the FTC’s unfairness authority and the GLBA Safeguards Rule. For the exam, pay attention to how “reasonable security” is defined and applied, as questions often test your ability to analyze what qualifies under different frameworks. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a00061a0/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 83 — Health Data Rules: WA MHMD, NV Health Data Act, and IL GIPA</title>
      <itunes:episode>83</itunes:episode>
      <podcast:episode>83</podcast:episode>
      <itunes:title>Episode 83 — Health Data Rules: WA MHMD, NV Health Data Act, and IL GIPA</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">173726f7-6d5b-45a4-91bb-8c50f851da6b</guid>
      <link>https://share.transistor.fm/s/fb9060e1</link>
      <description>
        <![CDATA[<p>Beyond HIPAA, states have introduced new health data privacy statutes. This episode explores Washington’s My Health My Data Act (MHMD), Nevada’s Consumer Health Data Privacy Act, and Illinois’ Genetic Information Privacy Act (GIPA). We’ll review how these laws define consumer health data, impose consent requirements, and establish rights for deletion and access.</p><p>We’ll also discuss enforcement patterns, including class actions under GIPA, and how these statutes expand privacy obligations beyond traditional healthcare providers. Exam questions may require distinguishing between HIPAA-covered entities and businesses subject to these new state health data rules. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Beyond HIPAA, states have introduced new health data privacy statutes. This episode explores Washington’s My Health My Data Act (MHMD), Nevada’s Consumer Health Data Privacy Act, and Illinois’ Genetic Information Privacy Act (GIPA). We’ll review how these laws define consumer health data, impose consent requirements, and establish rights for deletion and access.</p><p>We’ll also discuss enforcement patterns, including class actions under GIPA, and how these statutes expand privacy obligations beyond traditional healthcare providers. Exam questions may require distinguishing between HIPAA-covered entities and businesses subject to these new state health data rules. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:43:55 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/fb9060e1/3fd6a313.mp3" length="62350006" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1557</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Beyond HIPAA, states have introduced new health data privacy statutes. This episode explores Washington’s My Health My Data Act (MHMD), Nevada’s Consumer Health Data Privacy Act, and Illinois’ Genetic Information Privacy Act (GIPA). We’ll review how these laws define consumer health data, impose consent requirements, and establish rights for deletion and access.</p><p>We’ll also discuss enforcement patterns, including class actions under GIPA, and how these statutes expand privacy obligations beyond traditional healthcare providers. Exam questions may require distinguishing between HIPAA-covered entities and businesses subject to these new state health data rules. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fb9060e1/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 84 — Cookies and Tracking: Online Privacy Regulations</title>
      <itunes:episode>84</itunes:episode>
      <podcast:episode>84</podcast:episode>
      <itunes:title>Episode 84 — Cookies and Tracking: Online Privacy Regulations</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7ecefb42-e381-4a73-b683-8c34d51452b4</guid>
      <link>https://share.transistor.fm/s/fc38dd45</link>
      <description>
        <![CDATA[<p>State laws increasingly regulate cookies, pixels, and online tracking. This episode explains how transparency, consent, and opt-out obligations apply to digital advertising technologies. We’ll discuss requirements for cookie banners, preference signals, and global opt-out mechanisms.</p><p>We’ll also highlight enforcement actions where regulators targeted companies for noncompliance with cookie disclosure and choice obligations. For the exam, expect scenarios involving online tracking, where you must identify compliance requirements under different state frameworks. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>State laws increasingly regulate cookies, pixels, and online tracking. This episode explains how transparency, consent, and opt-out obligations apply to digital advertising technologies. We’ll discuss requirements for cookie banners, preference signals, and global opt-out mechanisms.</p><p>We’ll also highlight enforcement actions where regulators targeted companies for noncompliance with cookie disclosure and choice obligations. For the exam, expect scenarios involving online tracking, where you must identify compliance requirements under different state frameworks. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:44:29 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/fc38dd45/7922737f.mp3" length="65801184" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1644</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>State laws increasingly regulate cookies, pixels, and online tracking. This episode explains how transparency, consent, and opt-out obligations apply to digital advertising technologies. We’ll discuss requirements for cookie banners, preference signals, and global opt-out mechanisms.</p><p>We’ll also highlight enforcement actions where regulators targeted companies for noncompliance with cookie disclosure and choice obligations. For the exam, expect scenarios involving online tracking, where you must identify compliance requirements under different state frameworks. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fc38dd45/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 85 — Biometric Privacy: IL BIPA, WA, TX, and Related Statutes</title>
      <itunes:episode>85</itunes:episode>
      <podcast:episode>85</podcast:episode>
      <itunes:title>Episode 85 — Biometric Privacy: IL BIPA, WA, TX, and Related Statutes</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8e1a1553-cfa2-4c91-93bf-ca8121137a5d</guid>
      <link>https://share.transistor.fm/s/1299ce95</link>
      <description>
        <![CDATA[<p>Biometric privacy laws impose strict requirements on collecting and using data such as fingerprints, facial recognition, and iris scans. This episode covers the Illinois Biometric Information Privacy Act (BIPA), which requires consent, disclosure, and safeguards, as well as similar statutes in Washington and Texas. We’ll also review the growing number of lawsuits and settlements under BIPA, which highlight the risks of noncompliance.</p><p>These laws illustrate how biometric data is treated as highly sensitive and often subject to private rights of action. For the exam, focus on the core elements of biometric statutes and their enforcement impact. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Biometric privacy laws impose strict requirements on collecting and using data such as fingerprints, facial recognition, and iris scans. This episode covers the Illinois Biometric Information Privacy Act (BIPA), which requires consent, disclosure, and safeguards, as well as similar statutes in Washington and Texas. We’ll also review the growing number of lawsuits and settlements under BIPA, which highlight the risks of noncompliance.</p><p>These laws illustrate how biometric data is treated as highly sensitive and often subject to private rights of action. For the exam, focus on the core elements of biometric statutes and their enforcement impact. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:45:03 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/1299ce95/2f805a3d.mp3" length="67800880" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1694</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Biometric privacy laws impose strict requirements on collecting and using data such as fingerprints, facial recognition, and iris scans. This episode covers the Illinois Biometric Information Privacy Act (BIPA), which requires consent, disclosure, and safeguards, as well as similar statutes in Washington and Texas. We’ll also review the growing number of lawsuits and settlements under BIPA, which highlight the risks of noncompliance.</p><p>These laws illustrate how biometric data is treated as highly sensitive and often subject to private rights of action. For the exam, focus on the core elements of biometric statutes and their enforcement impact. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/1299ce95/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 86 — AI Bias and ADM: NAIC AIS Guidelines, NYC AEDT, and State Rules</title>
      <itunes:episode>86</itunes:episode>
      <podcast:episode>86</podcast:episode>
      <itunes:title>Episode 86 — AI Bias and ADM: NAIC AIS Guidelines, NYC AEDT, and State Rules</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">31f30757-c0cc-4491-a5b1-74108c39cdb0</guid>
      <link>https://share.transistor.fm/s/8ce5bca0</link>
      <description>
        <![CDATA[<p>Automated decision-making (ADM) and artificial intelligence raise fairness and discrimination concerns. This episode introduces the NAIC Artificial Intelligence Governance Guidelines, New York City’s Automated Employment Decision Tools (AEDT) law, and state-level rules in California and Colorado. We’ll examine requirements for transparency, testing, and bias audits.</p><p>We’ll also discuss how ADM intersects with both privacy and anti-discrimination frameworks. For the exam, expect questions that test your ability to identify compliance requirements for AI-driven decision-making tools across jurisdictions. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Automated decision-making (ADM) and artificial intelligence raise fairness and discrimination concerns. This episode introduces the NAIC Artificial Intelligence Governance Guidelines, New York City’s Automated Employment Decision Tools (AEDT) law, and state-level rules in California and Colorado. We’ll examine requirements for transparency, testing, and bias audits.</p><p>We’ll also discuss how ADM intersects with both privacy and anti-discrimination frameworks. For the exam, expect questions that test your ability to identify compliance requirements for AI-driven decision-making tools across jurisdictions. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:45:37 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8ce5bca0/36df2746.mp3" length="64181694" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1603</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Automated decision-making (ADM) and artificial intelligence raise fairness and discrimination concerns. This episode introduces the NAIC Artificial Intelligence Governance Guidelines, New York City’s Automated Employment Decision Tools (AEDT) law, and state-level rules in California and Colorado. We’ll examine requirements for transparency, testing, and bias audits.</p><p>We’ll also discuss how ADM intersects with both privacy and anti-discrimination frameworks. For the exam, expect questions that test your ability to identify compliance requirements for AI-driven decision-making tools across jurisdictions. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8ce5bca0/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 87 — California CCPA/CPRA: Comprehensive Consumer Privacy Framework</title>
      <itunes:episode>87</itunes:episode>
      <podcast:episode>87</podcast:episode>
      <itunes:title>Episode 87 — California CCPA/CPRA: Comprehensive Consumer Privacy Framework</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0f2dc6c6-32b3-49fe-b870-d9083a2a79cb</guid>
      <link>https://share.transistor.fm/s/38e0160d</link>
      <description>
        <![CDATA[<p>California remains the leader in state privacy law. This episode reviews the California Consumer Privacy Act (CCPA) and its amendment through the California Privacy Rights Act (CPRA). We’ll explore applicability thresholds, data subject rights, notice obligations, and enforcement by the California Privacy Protection Agency.</p><p>We’ll also highlight how the CCPA/CPRA compares to other state laws, often serving as the template for new frameworks. Exam questions frequently reference California’s statutes, so deep familiarity with their provisions is essential. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>California remains the leader in state privacy law. This episode reviews the California Consumer Privacy Act (CCPA) and its amendment through the California Privacy Rights Act (CPRA). We’ll explore applicability thresholds, data subject rights, notice obligations, and enforcement by the California Privacy Protection Agency.</p><p>We’ll also highlight how the CCPA/CPRA compares to other state laws, often serving as the template for new frameworks. Exam questions frequently reference California’s statutes, so deep familiarity with their provisions is essential. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:46:07 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/38e0160d/53a70a41.mp3" length="65367292" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1633</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>California remains the leader in state privacy law. This episode reviews the California Consumer Privacy Act (CCPA) and its amendment through the California Privacy Rights Act (CPRA). We’ll explore applicability thresholds, data subject rights, notice obligations, and enforcement by the California Privacy Protection Agency.</p><p>We’ll also highlight how the CCPA/CPRA compares to other state laws, often serving as the template for new frameworks. Exam questions frequently reference California’s statutes, so deep familiarity with their provisions is essential. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/38e0160d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 88 — California AADC: Age-Appropriate Design Code Protections</title>
      <itunes:episode>88</itunes:episode>
      <podcast:episode>88</podcast:episode>
      <itunes:title>Episode 88 — California AADC: Age-Appropriate Design Code Protections</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d13edc7d-1e37-48b9-b8a3-5e8c05fe5105</guid>
      <link>https://share.transistor.fm/s/2f1e5485</link>
      <description>
        <![CDATA[<p>Children’s privacy receives special attention in California’s Age-Appropriate Design Code Act (AADC). This episode explains its requirements for online services likely to be accessed by minors, including risk assessments, high privacy default settings, and restrictions on profiling. The law reflects growing concern about children’s digital wellbeing.</p><p>We’ll also discuss how the AADC interacts with COPPA and federal initiatives. Exam scenarios may involve applying AADC principles to online platforms, making this an increasingly important topic. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Children’s privacy receives special attention in California’s Age-Appropriate Design Code Act (AADC). This episode explains its requirements for online services likely to be accessed by minors, including risk assessments, high privacy default settings, and restrictions on profiling. The law reflects growing concern about children’s digital wellbeing.</p><p>We’ll also discuss how the AADC interacts with COPPA and federal initiatives. Exam scenarios may involve applying AADC principles to online platforms, making this an increasingly important topic. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:46:45 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2f1e5485/1541b67c.mp3" length="61172080" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1528</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Children’s privacy receives special attention in California’s Age-Appropriate Design Code Act (AADC). This episode explains its requirements for online services likely to be accessed by minors, including risk assessments, high privacy default settings, and restrictions on profiling. The law reflects growing concern about children’s digital wellbeing.</p><p>We’ll also discuss how the AADC interacts with COPPA and federal initiatives. Exam scenarios may involve applying AADC principles to online platforms, making this an increasingly important topic. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2f1e5485/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 89 — California Delete Act: Data Broker Registration and Rights</title>
      <itunes:episode>89</itunes:episode>
      <podcast:episode>89</podcast:episode>
      <itunes:title>Episode 89 — California Delete Act: Data Broker Registration and Rights</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2c34aa61-569f-48fd-bade-6c03a06a3923</guid>
      <link>https://share.transistor.fm/s/be15fb55</link>
      <description>
        <![CDATA[<p>The California Delete Act introduces obligations for data brokers, requiring them to register and enabling consumers to request deletion of their data from all registered brokers at once. This episode explores the mechanics of the Act, its impact on the data broker industry, and how it expands consumer control.</p><p>We’ll also review enforcement provisions and potential national ripple effects. Exam questions may test your knowledge of how the Delete Act operates alongside the CCPA/CPRA. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The California Delete Act introduces obligations for data brokers, requiring them to register and enabling consumers to request deletion of their data from all registered brokers at once. This episode explores the mechanics of the Act, its impact on the data broker industry, and how it expands consumer control.</p><p>We’ll also review enforcement provisions and potential national ripple effects. Exam questions may test your knowledge of how the Delete Act operates alongside the CCPA/CPRA. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:47:16 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/be15fb55/e993f8be.mp3" length="53597684" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1339</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The California Delete Act introduces obligations for data brokers, requiring them to register and enabling consumers to request deletion of their data from all registered brokers at once. This episode explores the mechanics of the Act, its impact on the data broker industry, and how it expands consumer control.</p><p>We’ll also review enforcement provisions and potential national ripple effects. Exam questions may test your knowledge of how the Delete Act operates alongside the CCPA/CPRA. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/be15fb55/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 90 — Virginia CDPA: Consumer Data Protection Act Essentials</title>
      <itunes:episode>90</itunes:episode>
      <podcast:episode>90</podcast:episode>
      <itunes:title>Episode 90 — Virginia CDPA: Consumer Data Protection Act Essentials</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">62318271-a881-4f09-8a5c-1b7e67ca5dfa</guid>
      <link>https://share.transistor.fm/s/2bbff54a</link>
      <description>
        <![CDATA[<p>Virginia’s Consumer Data Protection Act (CDPA) established one of the first comprehensive state privacy frameworks outside California. This episode reviews its applicability thresholds, consumer rights, and obligations for controllers and processors. We’ll also discuss how the CDPA balances business flexibility with consumer protections.</p><p>We’ll highlight how the CDPA differs from California’s laws, including its opt-in requirements for sensitive data and lack of a private right of action. For the exam, understanding these distinctions is critical for analyzing state privacy law questions. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Virginia’s Consumer Data Protection Act (CDPA) established one of the first comprehensive state privacy frameworks outside California. This episode reviews its applicability thresholds, consumer rights, and obligations for controllers and processors. We’ll also discuss how the CDPA balances business flexibility with consumer protections.</p><p>We’ll highlight how the CDPA differs from California’s laws, including its opt-in requirements for sensitive data and lack of a private right of action. For the exam, understanding these distinctions is critical for analyzing state privacy law questions. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:47:46 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2bbff54a/3f510925.mp3" length="55742316" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1392</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Virginia’s Consumer Data Protection Act (CDPA) established one of the first comprehensive state privacy frameworks outside California. This episode reviews its applicability thresholds, consumer rights, and obligations for controllers and processors. We’ll also discuss how the CDPA balances business flexibility with consumer protections.</p><p>We’ll highlight how the CDPA differs from California’s laws, including its opt-in requirements for sensitive data and lack of a private right of action. For the exam, understanding these distinctions is critical for analyzing state privacy law questions. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2bbff54a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 91 — Colorado Privacy Act: Rights, Duties, and Insurance Bias Provisions</title>
      <itunes:episode>91</itunes:episode>
      <podcast:episode>91</podcast:episode>
      <itunes:title>Episode 91 — Colorado Privacy Act: Rights, Duties, and Insurance Bias Provisions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">55de1597-6cb4-42db-937d-5e46b0aba264</guid>
      <link>https://share.transistor.fm/s/ca649942</link>
      <description>
        <![CDATA[<p>Colorado’s Privacy Act builds on the momentum from California and Virginia, offering a comprehensive framework with unique twists. This episode reviews its applicability standards, consumer rights, and controller/processor obligations, including data protection assessments. We’ll also cover Colorado’s focus on fairness in insurance, with rules addressing discriminatory practices tied to algorithmic decision-making.</p><p>By comparing Colorado’s law with CCPA/CPRA and CDPA, you’ll understand both commonalities and distinctions across state statutes. For the exam, focus on consumer rights, opt-out mechanisms, and Colorado’s insurance-specific provisions, which highlight emerging regulatory themes. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Colorado’s Privacy Act builds on the momentum from California and Virginia, offering a comprehensive framework with unique twists. This episode reviews its applicability standards, consumer rights, and controller/processor obligations, including data protection assessments. We’ll also cover Colorado’s focus on fairness in insurance, with rules addressing discriminatory practices tied to algorithmic decision-making.</p><p>By comparing Colorado’s law with CCPA/CPRA and CDPA, you’ll understand both commonalities and distinctions across state statutes. For the exam, focus on consumer rights, opt-out mechanisms, and Colorado’s insurance-specific provisions, which highlight emerging regulatory themes. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:48:17 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ca649942/152010ce.mp3" length="59066822" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1475</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Colorado’s Privacy Act builds on the momentum from California and Virginia, offering a comprehensive framework with unique twists. This episode reviews its applicability standards, consumer rights, and controller/processor obligations, including data protection assessments. We’ll also cover Colorado’s focus on fairness in insurance, with rules addressing discriminatory practices tied to algorithmic decision-making.</p><p>By comparing Colorado’s law with CCPA/CPRA and CDPA, you’ll understand both commonalities and distinctions across state statutes. For the exam, focus on consumer rights, opt-out mechanisms, and Colorado’s insurance-specific provisions, which highlight emerging regulatory themes. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ca649942/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 92 — Other State Acts: Emerging Comprehensive Privacy Laws</title>
      <itunes:episode>92</itunes:episode>
      <podcast:episode>92</podcast:episode>
      <itunes:title>Episode 92 — Other State Acts: Emerging Comprehensive Privacy Laws</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9ef15062-8e51-4185-baee-6df0b85b3fb3</guid>
      <link>https://share.transistor.fm/s/83f168b0</link>
      <description>
        <![CDATA[<p>Beyond California, Virginia, and Colorado, many states are adopting or considering comprehensive privacy laws. This episode surveys these developments, highlighting features of statutes in states like Connecticut, Utah, and others. We’ll discuss how they generally follow the same model of applicability thresholds, consumer rights, and controller/processor duties, while introducing state-specific variations.</p><p>We’ll also explain why tracking emerging laws is essential for compliance professionals, as the patchwork nature of state regulation continues to grow. For the exam, you may see references to newer laws or comparisons across jurisdictions, testing your ability to recognize shared principles and unique elements. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Beyond California, Virginia, and Colorado, many states are adopting or considering comprehensive privacy laws. This episode surveys these developments, highlighting features of statutes in states like Connecticut, Utah, and others. We’ll discuss how they generally follow the same model of applicability thresholds, consumer rights, and controller/processor duties, while introducing state-specific variations.</p><p>We’ll also explain why tracking emerging laws is essential for compliance professionals, as the patchwork nature of state regulation continues to grow. For the exam, you may see references to newer laws or comparisons across jurisdictions, testing your ability to recognize shared principles and unique elements. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:48:52 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/83f168b0/fcf2654e.mp3" length="56949994" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1422</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Beyond California, Virginia, and Colorado, many states are adopting or considering comprehensive privacy laws. This episode surveys these developments, highlighting features of statutes in states like Connecticut, Utah, and others. We’ll discuss how they generally follow the same model of applicability thresholds, consumer rights, and controller/processor duties, while introducing state-specific variations.</p><p>We’ll also explain why tracking emerging laws is essential for compliance professionals, as the patchwork nature of state regulation continues to grow. For the exam, you may see references to newer laws or comparisons across jurisdictions, testing your ability to recognize shared principles and unique elements. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/83f168b0/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 93 — Enforcement Mechanics: Cure Periods and Penalties</title>
      <itunes:episode>93</itunes:episode>
      <podcast:episode>93</podcast:episode>
      <itunes:title>Episode 93 — Enforcement Mechanics: Cure Periods and Penalties</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1ff90be7-3b50-41a8-949e-4837dc0281a0</guid>
      <link>https://share.transistor.fm/s/dcf21cf8</link>
      <description>
        <![CDATA[<p>Enforcement provisions determine how state privacy laws are applied in practice. This episode explains cure periods, which give businesses time to fix violations before penalties are imposed, and how these provisions differ across states. We’ll also examine penalties, remedies, and enforcement authority, often vested in state attorneys general or privacy agencies.</p><p>We’ll highlight how enforcement design affects compliance strategies and shapes the balance between business flexibility and consumer protection. Exam scenarios may ask you to identify enforcement mechanics in a given state law, making this an important area to master. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Enforcement provisions determine how state privacy laws are applied in practice. This episode explains cure periods, which give businesses time to fix violations before penalties are imposed, and how these provisions differ across states. We’ll also examine penalties, remedies, and enforcement authority, often vested in state attorneys general or privacy agencies.</p><p>We’ll highlight how enforcement design affects compliance strategies and shapes the balance between business flexibility and consumer protection. Exam scenarios may ask you to identify enforcement mechanics in a given state law, making this an important area to master. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:49:21 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/dcf21cf8/ca1d3583.mp3" length="54122786" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1352</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Enforcement provisions determine how state privacy laws are applied in practice. This episode explains cure periods, which give businesses time to fix violations before penalties are imposed, and how these provisions differ across states. We’ll also examine penalties, remedies, and enforcement authority, often vested in state attorneys general or privacy agencies.</p><p>We’ll highlight how enforcement design affects compliance strategies and shapes the balance between business flexibility and consumer protection. Exam scenarios may ask you to identify enforcement mechanics in a given state law, making this an important area to master. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/dcf21cf8/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 94 — Breach Notification: Definitions, Triggers, and Scope</title>
      <itunes:episode>94</itunes:episode>
      <podcast:episode>94</podcast:episode>
      <itunes:title>Episode 94 — Breach Notification: Definitions, Triggers, and Scope</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3558b59b-fbcc-4821-b42e-e80f8c332295</guid>
      <link>https://share.transistor.fm/s/aeafe072</link>
      <description>
        <![CDATA[<p>State breach notification laws form one of the most uniform yet varied areas of privacy law. This episode reviews the common elements—definitions of personal information, what constitutes a breach, and when notification is required. We’ll also explore differences across states, such as timelines, thresholds, and required content of notices.</p><p>We’ll also highlight consumer remedies like credit monitoring and the role of state enforcement. For the exam, expect scenarios where you must determine whether a breach triggers notification obligations under state law. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>State breach notification laws form one of the most uniform yet varied areas of privacy law. This episode reviews the common elements—definitions of personal information, what constitutes a breach, and when notification is required. We’ll also explore differences across states, such as timelines, thresholds, and required content of notices.</p><p>We’ll also highlight consumer remedies like credit monitoring and the role of state enforcement. For the exam, expect scenarios where you must determine whether a breach triggers notification obligations under state law. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:49:50 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/aeafe072/1f8c7c1e.mp3" length="53836714" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1345</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>State breach notification laws form one of the most uniform yet varied areas of privacy law. This episode reviews the common elements—definitions of personal information, what constitutes a breach, and when notification is required. We’ll also explore differences across states, such as timelines, thresholds, and required content of notices.</p><p>We’ll also highlight consumer remedies like credit monitoring and the role of state enforcement. For the exam, expect scenarios where you must determine whether a breach triggers notification obligations under state law. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/aeafe072/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 95 — State Variations: Comparing Notification Timelines and Duties</title>
      <itunes:episode>95</itunes:episode>
      <podcast:episode>95</podcast:episode>
      <itunes:title>Episode 95 — State Variations: Comparing Notification Timelines and Duties</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">82c2da2c-ea17-4985-b39c-8e3d9b2bfc17</guid>
      <link>https://share.transistor.fm/s/f1ebb954</link>
      <description>
        <![CDATA[<p>Even within the common framework of breach notification, state differences matter. This episode compares notification timelines, which can range from “without unreasonable delay” to fixed deadlines like 30 or 45 days. We’ll also examine variations in whom to notify, from affected consumers to regulators and credit reporting agencies.</p><p>Understanding these nuances is critical for compliance and for analyzing exam questions that present breach scenarios across multiple states. By mastering state variations, you’ll be able to quickly identify which obligations apply in a given fact pattern. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Even within the common framework of breach notification, state differences matter. This episode compares notification timelines, which can range from “without unreasonable delay” to fixed deadlines like 30 or 45 days. We’ll also examine variations in whom to notify, from affected consumers to regulators and credit reporting agencies.</p><p>Understanding these nuances is critical for compliance and for analyzing exam questions that present breach scenarios across multiple states. By mastering state variations, you’ll be able to quickly identify which obligations apply in a given fact pattern. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:50:19 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f1ebb954/eb127840.mp3" length="52527290" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1312</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Even within the common framework of breach notification, state differences matter. This episode compares notification timelines, which can range from “without unreasonable delay” to fixed deadlines like 30 or 45 days. We’ll also examine variations in whom to notify, from affected consumers to regulators and credit reporting agencies.</p><p>Understanding these nuances is critical for compliance and for analyzing exam questions that present breach scenarios across multiple states. By mastering state variations, you’ll be able to quickly identify which obligations apply in a given fact pattern. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f1ebb954/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 96 — Recent Changes: Pennsylvania SB 696 and Utah S.B. 127</title>
      <itunes:episode>96</itunes:episode>
      <podcast:episode>96</podcast:episode>
      <itunes:title>Episode 96 — Recent Changes: Pennsylvania SB 696 and Utah S.B. 127</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fc444143-7f7a-4752-add7-bafc80174a99</guid>
      <link>https://share.transistor.fm/s/26f09168</link>
      <description>
        <![CDATA[<p>State privacy laws continue to evolve. This episode reviews recent changes, such as Pennsylvania SB 696, which updated breach notification requirements, and Utah S.B. 127, which amended cybersecurity provisions. These examples show how states adapt their frameworks to address new threats and policy priorities.</p><p>For exam purposes, understanding recent changes demonstrates that privacy law is a moving target. You may be tested on specific updates or asked to analyze how new provisions fit within existing frameworks. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>State privacy laws continue to evolve. This episode reviews recent changes, such as Pennsylvania SB 696, which updated breach notification requirements, and Utah S.B. 127, which amended cybersecurity provisions. These examples show how states adapt their frameworks to address new threats and policy priorities.</p><p>For exam purposes, understanding recent changes demonstrates that privacy law is a moving target. You may be tested on specific updates or asked to analyze how new provisions fit within existing frameworks. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:50:47 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/26f09168/fe1a482d.mp3" length="68131114" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1702</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>State privacy laws continue to evolve. This episode reviews recent changes, such as Pennsylvania SB 696, which updated breach notification requirements, and Utah S.B. 127, which amended cybersecurity provisions. These examples show how states adapt their frameworks to address new threats and policy priorities.</p><p>For exam purposes, understanding recent changes demonstrates that privacy law is a moving target. You may be tested on specific updates or asked to analyze how new provisions fit within existing frameworks. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/26f09168/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 97 — Cross-Domain Comparison: Federal, State, and International Overlaps</title>
      <itunes:episode>97</itunes:episode>
      <podcast:episode>97</podcast:episode>
      <itunes:title>Episode 97 — Cross-Domain Comparison: Federal, State, and International Overlaps</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">896c5a0c-5598-4866-a068-ccfe9c2a5ddf</guid>
      <link>https://share.transistor.fm/s/fba12726</link>
      <description>
        <![CDATA[<p>The final episode ties everything together by comparing U.S. federal privacy laws, state-level frameworks, and international regimes like the GDPR. We’ll highlight how similar principles—such as data subject rights, accountability, and security safeguards—take different forms across jurisdictions. We’ll also explore where overlaps create synergies and where conflicts require careful navigation, such as multinational data transfers or AI governance.</p><p>By mastering these comparisons, you’ll see the full picture of privacy regulation and be prepared for the integrative questions on the exam. This episode closes the series with a comprehensive perspective, reinforcing that privacy law is both global and evolving. Produced by BareMetalCyber.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The final episode ties everything together by comparing U.S. federal privacy laws, state-level frameworks, and international regimes like the GDPR. We’ll highlight how similar principles—such as data subject rights, accountability, and security safeguards—take different forms across jurisdictions. We’ll also explore where overlaps create synergies and where conflicts require careful navigation, such as multinational data transfers or AI governance.</p><p>By mastering these comparisons, you’ll see the full picture of privacy regulation and be prepared for the integrative questions on the exam. This episode closes the series with a comprehensive perspective, reinforcing that privacy law is both global and evolving. Produced by BareMetalCyber.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 10:51:23 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/fba12726/32af3c0f.mp3" length="64442822" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1610</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The final episode ties everything together by comparing U.S. federal privacy laws, state-level frameworks, and international regimes like the GDPR. We’ll highlight how similar principles—such as data subject rights, accountability, and security safeguards—take different forms across jurisdictions. We’ll also explore where overlaps create synergies and where conflicts require careful navigation, such as multinational data transfers or AI governance.</p><p>By mastering these comparisons, you’ll see the full picture of privacy regulation and be prepared for the integrative questions on the exam. This episode closes the series with a comprehensive perspective, reinforcing that privacy law is both global and evolving. Produced by BareMetalCyber.com</p>]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fba12726/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Welcome to the CIPP/US Certification</title>
      <itunes:title>Welcome to the CIPP/US Certification</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <guid isPermaLink="false">b928270e-e27f-48c8-ac1d-f5cf2ec50bbc</guid>
      <link>https://share.transistor.fm/s/60120cb0</link>
      <description>
        <![CDATA[]]>
      </description>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <pubDate>Mon, 13 Oct 2025 23:23:38 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/60120cb0/a82c7615.mp3" length="4610088" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>116</itunes:duration>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <itunes:keywords>CIPP/US, privacy law, data protection, IAPP certification, exam prep, US privacy, federal privacy laws, state privacy laws, workplace privacy, consumer data, FTC enforcement, HIPAA, GLBA, FCRA, FERPA, CCPA, CPRA, GDPR comparison, data subject rights, privacy exam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
  </channel>
</rss>
