Learn Data Protection
Study Data Protection using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Sec+ SY0-701
Sec+ SY0-701
By: Travis G
2. Fundamentals Of Security, 3. Threat Actors, 6. Malware ...5Decks133Flashcards5Learners -
Law
Law
By: Jonty hart
1. Contract Formation, 2. Contract Termination, 3. Agency and Negligence ...9Decks324Flashcards5Learners -
Law
Law
By: Aiza Aslam
Legal Principles & International Law, Contract formation, Termination fo Contract ...13Decks449Flashcards1Learner -
Revision
Revision
By: Kezia Jeffreys
Module 1: Data Protection Laws, Module 2: Personal Data, Module 3: Controllers & Processors ...7Decks209Flashcards3Learners -
ICT
ICT
By: ruth mahase
Computer Specifications, Data protection, Computational Thinking ...5Decks53Flashcards2Learners -
Chapter 6
Chapter 6
By: Jacob PRANTALOS
Physical and software security controls, Software acquired from third parties, Software development practices ...7Decks27Flashcards1Learner -
Law
Law
By: Sam Chamberlain
Chapter 1 - Legal principles and international law, Chapter 2 - Contract formation, Chapter 3 - Termination of contract ...13Decks618Flashcards1Learner -
Technology And Data Risks
Technology And Data Risks
By: Roger Chetwynd
Introduction, Automation Capabilities, Availability Of App ...9Decks38Flashcards1Learner -
APC
APC
By: Harry Blansh
Valuation, Estate Agency Legislation, Accounting Principles ...11Decks126Flashcards21Learners -
IT systems
IT systems
By: Usman AK
A2 - Part 1, A2 - Part 2 Storage devices, A2 - Part 3 Accessibility Devices and Data Processess ...18Decks232Flashcards4Learners -
Law
Law
By: Mark Vrijhof
Module 1: Introduction to Law, Module 2: Private Law, Module 3: IP law ...5Decks105Flashcards1Learner -
CEI Basic (HR Recruiter)
CEI Basic (HR Recruiter)
By: Angelina Ong
Employment Agencies Regulatory Framework (general), Employment Of Foreign Manpower Act (FDW), Human Trafficking ...12Decks776Flashcards10Learners -
ICT
ICT
By: Danidhu Kavisekara
Peripheral Devices, Storage Devices, Computer Ports ...19Decks323Flashcards1Learner -
ICAEW Law: QB2020
ICAEW Law: QB2020
By: Robert Owen
01: Contract formation., 02: Termination of contract., 03. Agency. ...11Decks661Flashcards5Learners -
Cybersecurity
Cybersecurity
By: chris breed
Chapter 2 Identity and Access management, Chapter 3 Exploring network technologies and tools, Chapter 4 Securing your network ...13Decks429Flashcards1Learner -
Security and Programming Paradigms
Security and Programming Paradigms
By: Ab Up
Security Basics, Programming Paradigm basics, Input threats ...16Decks226Flashcards1Learner -
Google
Google
By: Benjamin Kavanagh
Compute, Storage, Databases ...22Decks157Flashcards151Learners -
Computing - Organised
Computing - Organised
By: Zayd IMRAN
Computer Systems - Translators, Data Representation - Logic Gates, Data Representation - Units ...22Decks361Flashcards1Learner -
Microsoft Azure ⭐️ Fundamentals (AZ-900)
Microsoft Azure ⭐️ Fundamentals (AZ-900)
By: Denis C
Module 0 - Core Cloud Concepts, Module 1a - Understanding Azure Architecture and Management - General Concepts, Module 1b - Understanding Azure Architecture and Management - Geographies, Regions and Zones ...38Decks644Flashcards148Learners -
Cybersecurity
Cybersecurity
By: Tom van Eijk
Introduction - Week 1, Risk Management and Control, Encryption ...7Decks95Flashcards1Learner -
CIPP/E
CIPP/E
By: Kezia Jeffreys
Origins and Historical Context of Data Protection Law1Decks28Flashcards7Learners -
ICT
ICT
By: Kai egg
Protocols, Storage devices, operating system ...11Decks66Flashcards2Learners -
Security+ GCGH Chapter 5, Securing Hosts & Data
Security+ GCGH Chapter 5, Securing Hosts & Data
By: StuffOffYouStuff .
Implementing Secure Systems, Deploying Mobile Devices Securely, Embedded Systems ...4Decks43Flashcards1Learner -
CompTIA Security+
CompTIA Security+
By: Rene Vargas
Chapter 2 - Monitoring Networks, Chapter 1 - Measuring and Weighing Risk, Chapter 3 - Understanding Devices and infrastructure ...12Decks292Flashcards51Learners -
Health and Social
Health and Social
By: Rebecca Edmondson
The Data Protection Act 19981Decks17Flashcards7Learners -
Security+
Security+
By: Hank Vries
Fundamentals of security, Threat Actors, Physical Security ...13Decks365Flashcards2Learners -
CIPM 2023
CIPM 2023
By: Jamison Schmidt
Privacy Program Management: Chapter 1 Intro to program management, Privacy Program Management: Chapter 2 Frameworks and Governance, Privacy Operational Life Cycle: Chapter 4 Assess ...10Decks153Flashcards12Learners -
CAS Exam Prep
CAS Exam Prep
By: Callum Fradley
AH Bribery Policy & Procedures, AH Data Protection Policy, Counter fraud awareness & reporting ...13Decks145Flashcards1Learner -
Snowflake SnowPro Core Certificates
Snowflake SnowPro Core Certificates
By: Billie Hurley
Snowflake Overview and Architecture | Performance and Tuning, Snowflake Virtual Warehouses ||Snowflake virtual warehouses || Snowflake storage and Protection, Snowflake data movement | account and security | semi-structured3Decks303Flashcards10Learners -
GDPR
GDPR
By: Amalie Østergaard
Data Protection Concepts, Territorial and Material Scope2Decks34Flashcards8Learners