Join Michelle Dennedy for an in-depth discussion in this video Vulnerability to a system, part of Understanding & Prioritizing Data Privacy.
- Vulnerability in the privacy context…is a little bit different than vulnerability…as we hear it in the security world…where vulnerability is really the surface of attack…where someone can get in or information can go out…in an unexpected or even criminal way.…Vulnerability in a data protection and privacy context…is the vulnerability that is really shared.…One side, the donor of the information, me.…The carbon based unit, the individual…that shares information or uses services…that process information and on the other side,…the organization that really builds…it's digital asset base.…
Based upon true, accurate, fair, moral, legal,…and ethical information…that it processes those data stories…that are processed by the organization…that help serve the customer and also recruit…and invite new and exciting employees.…So the vulnerability in…sharing information is always present.…Am I sharing it correctly?…Am I processing it correctly?…Is this the story that is the story I want to tell?…Is the story that's told…that will help me serve that individual better?…
- What is data privacy?
- Privacy vs. secrecy
- Trust and integrity
- What consumers expect
- Privacy solutions
Skill Level Intermediate
1. What Is Data Privacy?
2. The Importance of Data Privacy
3. What's at Stake?
4. Privacy Solutions
Next steps1m 48s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.