Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Build EU GDPR Data Protection Compliance from scratch (CIPT)
Build EU GDPR Data Protection Compliance from scratch (CIPT)
0_INTRO (1:04)
1.1_Welcome _ Intro (2:47)
1.2_Setting your expectations (1:12)
2.1_GDPR short intro (2:49)
2.2_Format _ Definitions (3:06)
2.3_Principles (1:12)
2.4_Lawfulness (1:49)
2.5_Consent _ Right of Data Subject (2:37)
2.6_Data Privacy Officer and Data Protection Impact Assessments _DPIA_ (1:35)
2.7_Codes of conduct and international transfers (1:41)
2.8_Fines and Penalties (1:49)
2.9 Secure Mgmt Commitment (2:19)
2.10 Plan your project (1:25)
2.11 - GDPR Roles and Responsibilities (2:18)
2.12 Communication_ awareness and training (1:27)
2.13 Personal Data Inventory (1:45)
2.14 Rights of the Data Subject (1:45)
2.15 DPIA_ Breaches and Record Processing (3:06)
2.16 Conclussion (3:18)
3.1_Evolving compliance requirements (4:24)
3.2_Major risks to a company_s IT framework (11:27)
3.3_Stakeholder expectations for privacy (4:49)
3.4_Privacy vs Security (3:51)
3.5_IT Governance vs Data Governance (1:56)
4.1_Foundational elements for embedding privacy in IT _1_ (11:16)
4.2_Foundational elements for embedding privacy in IT _2_ (4:28)
4.3_Common Privacy Principles (3:22)
5.1_Collection (8:03)
5.2_Use (7:18)
5.3_Disclosure (4:47)
5.4_Retention (7:00)
5.5_Destruction (4:44)
5.6_Authentication (9:07)
5.7_Identifiability (9:42)
5.8_Privacy by Design _ Redesign (5:07)
6.1 - Identity and Access Management _IAM_ (9:27)
6.2 - Credit card information _ processing (6:48)
6.3 - Remote access_ telecommuting and bridging devices to work (5:45)
6.4 Data Encryption (9:19)
6.5 Other privacy enhancing technologies (4:51)
7.2_Gap Assessment Tool (7:33)
7.3 Management Commitment (3:02)
7.4_Preparation Project Plan (2:54)
7.5_GDPR_Roles (4:13)
7.6_How to capture Personal Data in a Form (3:33)
7.7_GDPR Privacy Data Protection Policy (3:57)
7.8_Data Subject Req Procedure (2:34)
7.9_Data Protection Impact Assessment _DPIA_ (3:28)
7.10_How to treat international transfers (2:49)
7.11_Data Breach and IRP (3:15)
7.12_ISO and GDPR (2:15)
8.1. Introduction - what you will going to see in this section (3:31)
8.2 Identity Protection demo _AAD IP_ (12:37)
8.3 Privileged Identity Management demo _PIM_ (6:59)
8.4 Mobile Productivity policies demo _Intune_ (17:32)
8.5 Classification_ Labelling and Protection of Information demo _AIP_ (9:28)
8.6 Cloud App visibility (12:31)
8.7 Security in Cloud environemnts (11:27)
8.8 ATP Incident Response (9:15)
Final Conclusion (1:56)
Teach online with
4.3_Common Privacy Principles
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock