Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
National data protection authority
Graph Chatbot
Related lectures (32)
Login to filter by course
Login to filter by course
Reset
Information Security Importance
Emphasizes the importance of safeguarding data and systems from potential threats.
Cloud and Aggregation: Security and Privacy
Explores cloud computing, data aggregation, security risks, privacy defenses, and data protection techniques.
Introduction to Security and Privacy
Covers the basics of pedagogy, lesson structure, video capsules, and student evaluation.
Safe Surfing: Protecting Work and EPFL
Emphasizes the importance of protecting work and EPFL by following laws, securing data, and staying alert while surfing the internet.
Technologies Impact on Humanitarian Crisis
Explores the impact of technologies on humanitarian crises and the ethical considerations involved.
Internet Evolution: From Origins to Consequences
Explores the evolution and impact of the Internet, emphasizing the dual nature of technological advancements.
Data Management: FAIR Principles
Delves into the challenges of managing digital humanities data and the significance of the FAIR Data Principles.
IT Security Fundamentals
Covers the basics of IT security, emphasizing everyone's responsibility in protecting data and preventing cyber threats.
Legal Aspects: Personal Data Processing
Explores legal aspects of personal data processing, GDPR, online tracking challenges, data protection rights, and real-life cases.
Legal Aspects: Personal Data Processing and GDPR Compliance
Explores legal aspects of personal data processing, GDPR compliance, web tracking history, app privacy challenges, and online advertising practices.
Digital Transformation Impact
Delves into the impact of digital transformation on communication, collaboration, and accountability.
De-anonymization: The Risks of Anonymized Data
Discusses the risks of sharing supposedly anonymous data and the techniques to protect sensitive information.
Previous
Page 2 of 2
Next