Course curriculum

  • 1

    Overview of European Data Protection Board (EDPB) Guidelines & Examples

    • European Data Protection Board [EDPB]

    • Types of Breaches..

    • Types of Breaches...

    • Integrity Breach

    • Availability Breach

    • EDPB Guidelines

    • EDPB Guidelines

    • EDPB Guidelines

    • EDPB Guidelines

    • Role of Controller

    • Role of Controller

    • Various Attacks With Examples

    • Ransomware Attack

    • Exfiltration Attack

    • Hashed Passwords Exfiltration From A Website

    • A Former Employee Exfilters Business Data

    • Ways to Mitigate Risk

    • Conclusion

  • 2

    Introduction

    • Overview of Virtual Voice Assistant

    • Overview of European Data Protection Board

    • Technology Background

    • Benefits of Guideline

  • 3

    Components of Data Protection

    • Legal Framework

    • Identification of Data Processing and Stakeholder

    • Transparency

    • Purpose Limitation and Legal Basis

    • Processing of Children’s Data

    • Data Retention

    • Security

    • Processing of Special Category of Data

    • Data Minimization

    • Accountability

    • Data Protection by Design and by Default

  • 4

    Mechanism to Excercise Data Subject Right

    • Right to Access

    • Right to Rectification

    • Right to Erasure

    • Right to Data Portability

  • 5

    Case Studies & Examples

    • Case Study: Wealth Manager Improves Customer Service With Conversational AI

    • Case Study: How Virtual Assistants Boost Digitalization in Banking

  • 6

    Survey

    • Survey on Virtual Voice Assistant

  • 7

    Resources

    • Additional Reading

    • External Links / Reference Material

    • Riskpro Video

    • Riskpro Brochure

    • About Riskpro

    • Thank You

  • 8

    Feedback Survey

    • Please Share Your Feedback