This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Build EU GDPR Data Protection Compliance from scratch (CIPT)
Build EU GDPR Data Protection Compliance from scratch (CIPT)
0_INTRO (1:04)
1.1_Welcome _ Intro (2:47)
1.2_Setting your expectations (1:12)
2.1_GDPR short intro (2:49)
2.2_Format _ Definitions (3:06)
2.3_Principles (1:12)
2.4_Lawfulness (1:49)
2.5_Consent _ Right of Data Subject (2:37)
2.6_Data Privacy Officer and Data Protection Impact Assessments _DPIA_ (1:35)
2.7_Codes of conduct and international transfers (1:41)
2.8_Fines and Penalties (1:49)
2.9 Secure Mgmt Commitment (2:19)
2.10 Plan your project (1:25)
2.11 - GDPR Roles and Responsibilities (2:18)
2.12 Communication_ awareness and training (1:27)
2.13 Personal Data Inventory (1:45)
2.14 Rights of the Data Subject (1:45)
2.15 DPIA_ Breaches and Record Processing (3:06)
2.16 Conclussion (3:18)
3.1_Evolving compliance requirements (4:24)
3.2_Major risks to a company_s IT framework (11:27)
3.3_Stakeholder expectations for privacy (4:49)
3.4_Privacy vs Security (3:51)
3.5_IT Governance vs Data Governance (1:56)
4.1_Foundational elements for embedding privacy in IT _1_ (11:16)
4.2_Foundational elements for embedding privacy in IT _2_ (4:28)
4.3_Common Privacy Principles (3:22)
5.1_Collection (8:03)
5.2_Use (7:18)
5.3_Disclosure (4:47)
5.4_Retention (7:00)
5.5_Destruction (4:44)
5.6_Authentication (9:07)
5.7_Identifiability (9:42)
5.8_Privacy by Design _ Redesign (5:07)
6.1 - Identity and Access Management _IAM_ (9:27)
6.2 - Credit card information _ processing (6:48)
6.3 - Remote access_ telecommuting and bridging devices to work (5:45)
6.4 Data Encryption (9:19)
6.5 Other privacy enhancing technologies (4:51)
7.2_Gap Assessment Tool (7:33)
7.3 Management Commitment (3:02)
7.4_Preparation Project Plan (2:54)
7.5_GDPR_Roles (4:13)
7.6_How to capture Personal Data in a Form (3:33)
7.7_GDPR Privacy Data Protection Policy (3:57)
7.8_Data Subject Req Procedure (2:34)
7.9_Data Protection Impact Assessment _DPIA_ (3:28)
7.10_How to treat international transfers (2:49)
7.11_Data Breach and IRP (3:15)
7.12_ISO and GDPR (2:15)
8.1. Introduction - what you will going to see in this section (3:31)
8.2 Identity Protection demo _AAD IP_ (12:37)
8.3 Privileged Identity Management demo _PIM_ (6:59)
8.4 Mobile Productivity policies demo _Intune_ (17:32)
8.5 Classification_ Labelling and Protection of Information demo _AIP_ (9:28)
8.6 Cloud App visibility (12:31)
8.7 Security in Cloud environemnts (11:27)
8.8 ATP Incident Response (9:15)
Final Conclusion (1:56)
5.5_Destruction
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock