Course Objectives
Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to preempt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal
Agenda
- Reviewing the modern history of privacy
- Foundational privacy concepts
- Data protection roles and fair information practices
- Exploring the impacts of privacy and data protection regulations on information management
- Compliance requirements
- IT risks
- Stakeholder privacy expectations
- Differentiating between privacy and security
- Foundational elements for embedding privacy in IT
- Common privacy principles
- Data protection by design and default
- Privacy considerations throughout the stages of the information life cycle
- Examining the risks inherent in the IT environment and options for addressing them
- Identity and access management
- Credit card information and processing
- Remote access
- BYOD and telecommuting
- Data encryption
- Additional privacy-enhancing technologies in the enterprise environment
- Strengths and weaknesses of authentication techniques
- Using identifiers
- Privacy by design
- Unique challenges that come from online privacy issues
- Laws and regulations
- Online threats
- Social media
- E-commerce
- Tracking technologies
- Web security protocols
- Privacy considerations associated with a variety of technologies
- Cloud computing
- Wireless IDs
- Location-based services
- “Smart” technologies
- Video/data/audio surveillance
- Biometric recognition
FREE
Interested in course?
Course Type: Instructor Led