Course curriculum

    1. European Data Protection Board [EDPB]

    2. Types of Breaches..

    3. Types of Breaches...

    4. Integrity Breach

    5. Availability Breach

    6. EDPB Guidelines

    7. EDPB Guidelines

    8. EDPB Guidelines

    9. EDPB Guidelines

    10. Role of Controller

    11. Role of Controller

    12. Various Attacks With Examples

    13. Ransomware Attack

    14. Exfiltration Attack

    15. Hashed Passwords Exfiltration From A Website

    16. A Former Employee Exfilters Business Data

    17. Ways to Mitigate Risk

    18. Conclusion

    1. Overview of Virtual Voice Assistant

    2. Overview of European Data Protection Board

    3. Technology Background

    4. Benefits of Guideline

    1. Legal Framework

    2. Identification of Data Processing and Stakeholder

    3. Transparency

    4. Purpose Limitation and Legal Basis

    5. Processing of Children’s Data

    6. Data Retention

    7. Security

    8. Processing of Special Category of Data

    9. Data Minimization

    10. Accountability

    11. Data Protection by Design and by Default

    1. Right to Access

    2. Right to Rectification

    3. Right to Erasure

    4. Right to Data Portability

    1. Case Study: Wealth Manager Improves Customer Service With Conversational AI

    2. Case Study: How Virtual Assistants Boost Digitalization in Banking

    1. Survey on Virtual Voice Assistant

About this course

  • Free
  • 47 lessons
  • 0 hours of video content