Skip to main content
21 Interactive Exercises

Privacy & Compliance
Training

21 free interactive exercises across 2 structured courses covering GDPR compliance and OWASP privacy risks.

Every exercise is free, runs in your browser, and requires no sign-up. Prepare your team for the privacy requirements auditors actually check.

1

GDPR Compliance

11 exercises

Marketing Consent Management

Build compliant opt-in flows that regulators accept.

  • Apply GDPR Article 7 consent standards
  • Design proper consent withdrawal mechanisms
Play Exercise

Data Breach Response

Triage a breach and meet the 72-hour notification clock.

  • Apply Article 33 notification requirements
  • Assess breach severity and reporting thresholds
  • Draft a supervisory authority notification
Play Exercise

Privacy by Design Review

Evaluate a product feature through a privacy-first lens.

  • Apply Article 25 data minimization checks
  • Identify privacy gaps in product designs
Play Exercise

Legitimate DSAR Processing

Process a data subject access request end to end.

  • Verify requester identity under Article 15
  • Search and compile data across systems
  • Meet the 30-day response deadline
Play Exercise

PII Document Redaction

Redact personal data from documents before disclosure.

  • Strip PII from text and metadata layers
  • Avoid recoverable redaction failures
Play Exercise

Fraudulent DSAR Detection

Spot fake data access requests used for social engineering.

  • Identify fraudulent DSAR indicators
  • Apply Article 12(6) refusal grounds
Play Exercise

Third-Party Data Processor Vetting

Evaluate a vendor's data processing controls before signing.

  • Review DPA terms against Article 28
  • Assess sub-processor chains and controls
  • Apply vendor risk scoring frameworks
Play Exercise

Security Incident Response

Coordinate security and privacy teams during a live breach.

  • Run parallel security and privacy workstreams
  • Triage breach severity for Article 33 reporting
  • Apply IBM-benchmarked IR plan savings
Play Exercise

Cross-Border Data Transfers

Navigate transfer mechanisms for data leaving the EEA.

  • Select the right transfer mechanism (SCCs, BCRs)
  • Conduct a Transfer Impact Assessment
  • Apply Schrems II safeguard requirements
Play Exercise

Data Protection Impact Assessment

Run a DPIA for a high-risk data processing activity.

  • Identify Article 35 DPIA triggers
  • Apply structured risk assessment methodology
  • Document DPO consultation outcomes
Play Exercise

Data Mapping and Records of Processing

Build an Article 30 processing register from scratch.

  • Conduct cross-department data flow interviews
  • Create a compliant Records of Processing register
  • Map data flows across systems and vendors
Play Exercise
2

OWASP Top 10 Privacy Risks

10 exercises

Soon

Privacy Breach Through Application Vulnerabilities

Discover a web application vulnerability that silently leaks personal data through error messages and insecure API responses.

  • Detect personal data exposure in application error messages and API responses
  • Trace how a broken access control flaw enables mass extraction of user records
  • Apply secure coding verification checks that prevent privacy-impacting vulnerabilities
Play Exercise
Soon

Internal Data Leakage to Unauthorized Parties

Contain a data leakage incident where customer PII reaches unauthorized vendors through misconfigured file sharing.

  • Trace how misconfigured access controls route sensitive data to unauthorized recipients
  • Identify personal data exposure in shared documents, exports, and collaboration tools
  • Apply data loss prevention controls that catch PII before it leaves authorized boundaries
Play Exercise
Soon

Handling a Personal Data Breach

Manage a data breach where your organization must contain the leak, notify regulators, and inform affected individuals under tight deadlines.

  • Execute a breach response timeline from detection through containment to regulatory notification
  • Identify failures in breach response that increase regulatory penalties and user harm
  • Apply structured incident response procedures that meet GDPR 72-hour notification requirements
Play Exercise
Soon

Consent Dark Patterns and Bundled Permissions

Fix a sign-up form that bundles multiple consent purposes into a single checkbox, violating granular consent requirements.

  • Identify bundled consent patterns that violate GDPR granularity requirements
  • Redesign consent flows to separate distinct processing purposes into individual choices
  • Apply consent design principles that give users meaningful control over their data
Play Exercise
Soon

Opaque Privacy Policies and Hidden Data Practices

Audit a corporate privacy policy that uses legal jargon to obscure how personal data is actually collected, stored, and shared.

  • Identify vague and misleading language in privacy notices that obscures actual data practices
  • Evaluate whether a privacy policy meets GDPR transparency and plain language requirements
  • Rewrite opaque policy clauses into clear, specific disclosures that users can actually understand
Play Exercise
Soon

Personal Data Deletion Failures

Trace a user's deletion request across backups, analytics systems, and third-party integrations to ensure no personal data persists.

  • Map personal data locations across production databases, backups, analytics, and third-party systems
  • Identify residual data that persists after standard account deletion procedures
  • Apply comprehensive deletion workflows that satisfy right-to-erasure requirements across fragmented data landscapes
Play Exercise
Soon

Outdated and Inaccurate Personal Data

Investigate how outdated and incorrect personal data in a CRM causes real harm through wrong credit decisions and misdirected communications.

  • Identify inaccurate, outdated, and duplicate records in a customer database that affect real individuals
  • Trace how data quality failures lead to concrete harms including wrong credit decisions and misdirected communications
  • Apply data quality controls including validation rules, update workflows, and accuracy auditing processes
Play Exercise
Soon

Session Hijacking Through Missing Expiration

Discover that a shared workstation retains full access to a previous user's personal accounts and medical records due to missing session expiration.

  • Identify persistent sessions on shared devices that expose previous users' personal data
  • Trace how missing session expiration enables unauthorized access to accounts, medical records, and financial data
  • Apply session management controls including timeout policies, device binding, and activity-based expiration
Play Exercise
Soon

Blocked Data Subject Access Requests

Fulfill a data subject access request by locating personal data scattered across fragmented systems before the regulatory deadline expires.

  • Locate personal data across fragmented databases, email archives, and third-party processors to fulfill a DSAR
  • Identify gaps in data inventory that prevent complete and timely response to access requests
  • Apply structured DSAR fulfillment workflows that meet the GDPR 30-day response deadline
Play Exercise
Soon

Excessive Personal Data Collection

Audit a registration form and analytics implementation that collect far more personal data than the service actually needs.

  • Identify personal data fields in forms and analytics that exceed what is necessary for the stated purpose
  • Evaluate each data collection point against the GDPR data minimization principle
  • Apply data minimization redesign to reduce collection to only what is strictly required for service delivery
Play Exercise

What Is Privacy & Compliance Training?

Privacy and compliance training teaches employees to handle personal data according to regulations like GDPR and industry frameworks like the OWASP Top 10 Privacy Risks. GDPR applies to any organization processing personal data of EU residents, with fines up to EUR 20 million or 4% of annual global turnover for non-compliance.

This catalogue covers 21 exercises across 2 courses. The GDPR Compliance course covers breach notification, data subject access requests, privacy by design, cross-border transfers, and processor vetting. The OWASP Top 10 Privacy Risks course covers application vulnerabilities that leak personal data, operator-sided data leakage, breach response failures, consent dark patterns, non-transparent policies, insufficient data deletion, data quality issues, session expiration gaps, blocked access requests, and excessive data collection.

Every exercise simulates real compliance scenarios employees encounter in their daily work, from handling DSARs to auditing consent forms.

Privacy & Compliance FAQ

Common questions about GDPR compliance, OWASP privacy risks, and our data protection training exercises.

What does GDPR Article 7 require for marketing consent?

GDPR Article 7 requires that consent be freely given, specific, informed, and unambiguous. Organizations must use clear affirmative action like unticked checkboxes, keep records proving when and how consent was obtained, and make withdrawal as easy as opting in.

Pre-ticked boxes, bundled consent, and vague privacy policies do not meet the standard. Regulators have imposed over EUR 400M in fines related to consent violations.

What is the GDPR 72-hour breach notification rule?

Under GDPR Article 33, organizations must notify their supervisory authority within 72 hours of becoming aware of a personal data breach, unless the breach is unlikely to result in a risk to individuals.

The notification must include the nature of the breach, approximate number of affected individuals, likely consequences, and measures taken. British Airways was fined GBP 20M partly for delayed and inadequate breach response.

What is privacy by design under GDPR?

Privacy by design, codified in GDPR Article 25, requires organizations to integrate data protection into the design of systems and processes from the start, not bolt it on afterward. This includes data minimization, purpose limitation, and privacy-protective default settings.

The concept originated with Ann Cavoukian's seven foundational principles in the 1990s and became a legal obligation when the GDPR took effect in 2018.

What is a DSAR under GDPR?

A Data Subject Access Request (DSAR) is a right under GDPR Article 15 allowing any individual to request a copy of the personal data an organization holds about them.

Organizations must respond within 30 days, provide the data in an accessible format, and include information about processing purposes, retention periods, and third-party recipients. Requests can arrive through any channel, including email, web forms, or verbal communication.

What does GDPR Article 28 require for data processors?

Article 28 requires a written contract, called a Data Processing Agreement (DPA), between the controller and every processor handling personal data. The DPA must specify the processing purpose, data types, duration, and security measures.

Processors can only engage sub-processors with prior written authorization from the controller. The processor must assist with DSARs, breach notification, and data deletion, and submit to audits by the controller.

What is the OWASP Top 10 Privacy Risks?

The OWASP Top 10 Privacy Risks is an industry framework that identifies the ten most common ways organizations mishandle personal data.

It covers web application vulnerabilities that leak PII, operator-sided data leakage, insufficient breach response, bundled consent, non-transparent policies, failed data deletion, poor data quality, missing session expiration, blocked data subject access, and excessive data collection. The framework helps organizations assess and mitigate privacy risks beyond regulatory compliance.

How does the OWASP Privacy Risks list relate to GDPR?

The OWASP Top 10 Privacy Risks overlaps significantly with GDPR requirements. For example, OWASP P3 (Insufficient Data Breach Response) maps to GDPR Article 33 breach notification, P4 (Consent on Everything) maps to Article 7 consent requirements, P6 (Insufficient Deletion) maps to Article 17 right to erasure, and P9 (Inability to Access Data) maps to Article 15 data subject access rights.

Training on both frameworks gives teams a complete picture of privacy obligations.

Deploy Privacy Training Across Your Organization

Roll out interactive privacy and compliance training to your entire workforce. SCORM-compatible, analytics-ready, and designed for enterprise deployment.