Personal Data Privacy - Lesson 2
In this module, we identify the various threats to data privacy and discuss 30 practical ways to protect yourself online.
Test Your Knowledge
Handouts
Lecture Slides A
Lecture Slides B
Module Overview
Limitations on Data Privacy Rights
30 Ways to Protect Yourself Online : Part One
30 Ways to Protect Yourself Online : Part Two
30 Ways to Protect Yourself Online : Part 3
SECTION REVIEW: Ways to Protect Yourself Online
Internal Weaknesses
Malicious Attacks
Emerging Attack Platforms
Implement Privacy and Data Protection Measures
Develop a Privacy Management Program and Privacy Manual
Implement Privacy and Data Protection Measures - 1
Implement Privacy and Data Protection Measures - 2
Assessment of Security Incident and Data Breach
Security Incident Management Policy
Security Incident Response Team and Annual Reports
Mandatory Notification
Data Breach Notification
Personal Data Controller
Subsequent Investigation
SECTION REVIEW: Five Pillars of Data Privacy Accountability and Compliance
Conclusion
Scenario 1
Questions for Scenario 1
Scenario 2
Questions for Scenario 2
Scenario 3
Questions for Scenario 3
Scenario 4
Questions for Scenario 4
CASE STUDY: Uber Technologies
Questions: Uber Technologies
Conclusion
Keypoints
Quiz: Understanding Data Privacy Law - Lesson 2
Jeff-Mike Smith Sule
Expected from the course program: Appreciate the Data Privacy Act of 2012; various data privacy rights; limitations on data privacy rights; different ways to protect personal data in online transactions; a myriad of threats to data privacy; and the five pillars of data privacy accountability and compliance.
LEARNING OUTCOMES |
TOPICS TO BE DISCUSSED |
SPECIFIC OBJECTIVES OF THE TOPICS OR SUBTOPICS |
Learn the various ways to protect personal data privacy in online transactions |
Ways to Protect Online Data Privacy |
Obtain knowledge and apply best practices to protect data privacy in online dealings |
Learn a myriad of threats that compromise personal data privacy |
Threats to Data Privacy |
Gain an understanding of how personal data privacy are exposed to different threats
Emerging attack platforms |
Reinforce facts and principles covered in the lesson |
Slides/Reading Materials |
Recapture an overview of and retain in memory the principles of personal data privacy |
Master the facts and principles covered in the lesson |
Short Quiz (Multiple Choice) |
Gain mastery of the principles and applications covered in the module |
Know the threats to data privacy and learn how to protect yourself online!