Join Michelle Dennedy for an in-depth discussion in this video Data in the wrong hands, part of Understanding & Prioritizing Data Privacy.
- Data breaches, data loses, data vulnerabilities,…data mishaps, we hear the headlines…every single day in the news.…What happens when there is an attack?…When there is a breach, when there is a loss?…Can be a number of different things.…So data that is not well governed and curated…and by curated I mean put into a place of pride.…Such as when you walk into a museum and you see pictures…in a certain order and lighting in a certain way…and the flow in a certain way.…
Data that's curated in a certain way when it's attacked…can be it's own vulnerability…because you've put too much data out on show…and someone has reached in and grabbed it…and run away with it.…Or you could have back end system…or someone is actively hacking in.…So what are these loses and who are these attackers?…All sorts of different types of people…but I'll boil it down particularly the knowing, willful…and criminal types of activities that really…are the major concern of data breaches.…
Rather than the lost laptop sitting in the pocket…of your plane seat which happens all the time, by the way,…
- What is data privacy?
- Privacy vs. secrecy
- Trust and integrity
- What consumers expect
- Privacy solutions
Skill Level Intermediate
1. What Is Data Privacy?
2. The Importance of Data Privacy
3. What's at Stake?
4. Privacy Solutions
Next steps1m 48s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.