Data Priacy, Video Edition
Focused View
12:19:26
76 View
Chapter 1. How data flows into and within your company.mp4
03:46
Chapter 1. How priacy affects your business at a macro leel.mp4
09:05
Chapter 1. How the role of engineers has changed, and how that has affected priacy.mp4
05:37
Chapter 1. Priacy A mental model.mp4
04:23
Chapter 1. Priacy engineering Why it s needed, how to scale it.mp4
11:04
Chapter 1. Priacy tech and tooling Your options and your choices.mp4
16:36
Chapter 1. Summary.mp4
01:02
Chapter 1. What this book will not do.mp4
00:31
Chapter 1. Why priacy matters.mp4
29:00
Chapter 2. After building the tools comes the hard part Building a program.mp4
07:05
Chapter 2. As you build a program, build a priacy-first culture.mp4
04:46
Chapter 2. Data, your business growth strategy, and priacy.mp4
04:18
Chapter 2. Examples When priacy is iolated.mp4
10:56
Chapter 2. Priacy and the regulatory landscape.mp4
05:55
Chapter 2. Priacy and the user.mp4
04:54
Chapter 2. Summary.mp4
01:01
Chapter 2. This could be your company.mp4
06:49
Chapter 2. Understanding data and priacy.mp4
13:35
Chapter 3. Data classification.mp4
05:50
Chapter 3. Data classification An example.mp4
05:43
Chapter 3. How to classify data with a focus on priacy laws.mp4
05:50
Chapter 3. How you can implement data classification to improe priacy.mp4
11:43
Chapter 3. Summary.mp4
01:06
Chapter 3. The data classification process.mp4
11:23
Chapter 3. Why data classification is necessary.mp4
28:04
Chapter 4. A data inentory is not a binary process.mp4
08:15
Chapter 4. Creating a baseline.mp4
03:34
Chapter 4. Data inentory.mp4
09:04
Chapter 4. Machine-readable tags.mp4
09:14
Chapter 4. Summary.mp4
00:51
Chapter 4. The technical architecture.mp4
17:51
Chapter 4. Understanding the data.mp4
05:31
Chapter 4. What does a successful data inentory process look like.mp4
05:07
Chapter 4. When should you start the data inentory process.mp4
09:22
Chapter 5. Data sharing.mp4
18:00
Chapter 5. How to share data safely Security as an ally of priacy.mp4
15:40
Chapter 5. Measuring priacy impact.mp4
10:43
Chapter 5. Obfuscation techniques for priacy-safe data sharing.mp4
18:30
Chapter 5. Priacy harms This is not a drill.mp4
04:42
Chapter 5. Sharing internal IDs with third parties.mp4
10:24
Chapter 5. Summary.mp4
01:15
Chapter 6. Implementing the legal priacy reiew process.mp4
03:31
Chapter 6. Integrating technical priacy reiews into the innoation pipeline.mp4
10:24
Chapter 6. Making the case for a technical priacy reiew.mp4
09:18
Chapter 6. Sample technical priacy reiews.mp4
09:50
Chapter 6. Scaling the technical priacy reiew process.mp4
07:33
Chapter 6. Summary.mp4
01:08
Chapter 6. The technical priacy reiew.mp4
21:14
Chapter 7. Data deletion.mp4
05:57
Chapter 7. Deleting account-leel data Automation and scaling for distributed serices.mp4
12:11
Chapter 7. Deleting account-leel data A starting point.mp4
07:28
Chapter 7. How the data collection architecture works.mp4
03:08
Chapter 7. Sensitie data deletion.mp4
07:36
Chapter 7. Summary.mp4
00:51
Chapter 7. What does a modern data collection architecture look like.mp4
13:12
Chapter 7. Who should own data deletion.mp4
02:07
Chapter 8. DSAR automation, data structures, and data flows.mp4
17:16
Chapter 8. Exporting user data Data Subject Access Requests.mp4
17:51
Chapter 8. Internal-facing screens and dashboards.mp4
06:35
Chapter 8. Setting up the DSAR process.mp4
08:21
Chapter 8. Summary.mp4
00:58
Chapter 9. A consent management platform.mp4
03:47
Chapter 9. A data schema model for consent management.mp4
15:52
Chapter 9. Building a consent management platform.mp4
16:53
Chapter 9. Consent code Objects.mp4
18:27
Chapter 9. Integrating consent management into product workflow.mp4
08:04
Chapter 9. Other useful capabilities in a CMP.mp4
05:01
Chapter 9. Summary.mp4
00:46
Chapter 10. Closing security ulnerabilities.mp4
33:53
Chapter 10. Protecting priacy by closing access-control gaps.mp4
08:52
Chapter 10. Protecting priacy by managing perimeter access.mp4
55:50
Chapter 10. Summary.mp4
00:56
Chapter 11. Priacy and the regulatory climate.mp4
09:47
Chapter 11. Scaling, hiring, and considering regulations.mp4
24:12
Chapter 11. Summary.mp4
00:36
Chapter 11. The priacy engineering domain and skills.mp4
07:20
Part 1. Priacy, data, and your business.mp4
01:19
Part 2. A proactie priacy program Data goernance.mp4
01:14
Part 3. Building tools and processes.mp4
01:06
Part 4. Security, scaling, and staffing.mp4
00:57
More details
User Reviews
Rating
average 0
Focused display
Category

O'Reilly
View courses O'ReillyO'Reilly Media is an American learning company established by Tim O'Reilly that publishes books, produces tech conferences, and provides an online learning platform. Its distinctive brand features a woodcut of an animal on many of its book covers.
- language english
- Training sessions 80
- duration 12:19:26
- Release Date 2024/07/26