وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Data Priacy, Video Edition

سرفصل های دوره
  • Chapter 1. How data flows into and within your company
  • Chapter 1. How priacy affects your business at a macro leel
  • Chapter 1. How the role of engineers has changed, and how that has affected priacy
  • Chapter 1. Priacy A mental model
  • Chapter 1. Priacy engineering Why it s needed, how to scale it
  • Chapter 1. Priacy tech and tooling Your options and your choices
  • Chapter 1. Summary
  • Chapter 1. What this book will not do
  • Chapter 1. Why priacy matters
  • Chapter 2. After building the tools comes the hard part Building a program
  • Chapter 2. As you build a program, build a priacy-first culture
  • Chapter 2. Data, your business growth strategy, and priacy
  • Chapter 2. Examples When priacy is iolated
  • Chapter 2. Priacy and the regulatory landscape
  • Chapter 2. Priacy and the user
  • Chapter 2. Summary
  • Chapter 2. This could be your company
  • Chapter 2. Understanding data and priacy
  • Chapter 3. Data classification
  • Chapter 3. Data classification An example
  • Chapter 3. How to classify data with a focus on priacy laws
  • Chapter 3. How you can implement data classification to improe priacy
  • Chapter 3. Summary
  • Chapter 3. The data classification process
  • Chapter 3. Why data classification is necessary
  • Chapter 4. A data inentory is not a binary process
  • Chapter 4. Creating a baseline
  • Chapter 4. Data inentory
  • Chapter 4. Machine-readable tags
  • Chapter 4. Summary
  • Chapter 4. The technical architecture
  • Chapter 4. Understanding the data
  • Chapter 4. What does a successful data inentory process look like
  • Chapter 4. When should you start the data inentory process
  • Chapter 5. Data sharing
  • Chapter 5. How to share data safely Security as an ally of priacy
  • Chapter 5. Measuring priacy impact
  • Chapter 5. Obfuscation techniques for priacy-safe data sharing
  • Chapter 5. Priacy harms This is not a drill
  • Chapter 5. Sharing internal IDs with third parties
  • Chapter 5. Summary
  • Chapter 6. Implementing the legal priacy reiew process
  • Chapter 6. Integrating technical priacy reiews into the innoation pipeline
  • Chapter 6. Making the case for a technical priacy reiew
  • Chapter 6. Sample technical priacy reiews
  • Chapter 6. Scaling the technical priacy reiew process
  • Chapter 6. Summary
  • Chapter 6. The technical priacy reiew
  • Chapter 7. Data deletion
  • Chapter 7. Deleting account-leel data Automation and scaling for distributed serices
  • Chapter 7. Deleting account-leel data A starting point
  • Chapter 7. How the data collection architecture works
  • Chapter 7. Sensitie data deletion
  • Chapter 7. Summary
  • Chapter 7. What does a modern data collection architecture look like
  • Chapter 7. Who should own data deletion
  • Chapter 8. DSAR automation, data structures, and data flows
  • Chapter 8. Exporting user data Data Subject Access Requests
  • Chapter 8. Internal-facing screens and dashboards
  • Chapter 8. Setting up the DSAR process
  • Chapter 8. Summary
  • Chapter 9. A consent management platform
  • Chapter 9. A data schema model for consent management
  • Chapter 9. Building a consent management platform
  • Chapter 9. Consent code Objects
  • Chapter 9. Integrating consent management into product workflow
  • Chapter 9. Other useful capabilities in a CMP
  • Chapter 9. Summary
  • Chapter 10. Closing security ulnerabilities
  • Chapter 10. Protecting priacy by closing access-control gaps
  • Chapter 10. Protecting priacy by managing perimeter access
  • Chapter 10. Summary
  • Chapter 11. Priacy and the regulatory climate
  • Chapter 11. Scaling, hiring, and considering regulations
  • Chapter 11. Summary
  • Chapter 11. The priacy engineering domain and skills
  • Part 1. Priacy, data, and your business
  • Part 2. A proactie priacy program Data goernance
  • Part 3. Building tools and processes
  • Part 4. Security, scaling, and staffing
  • 67,300 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 38815
    حجم: 14057 مگابایت
    مدت زمان: 740 دقیقه
    تاریخ انتشار: 20 مرداد 1403
    طراحی سایت و خدمات سئو

    67,300 تومان
    افزودن به سبد خرید