Learn Data Protection
Study Data Protection using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
APC
APC
By: Caspar Courage
Leasehold Reform Act, RICS, Health & Safety ...17Decks287Flashcards6Learners -
TBM960
TBM960
By: Giorgio Manganiello
Airframe, Engine, Fuel System ...15Decks206Flashcards2Learners -
CIPP/E
CIPP/E
By: Ashley Pusey
Origins & Development of European Data Protection Law1Decks25Flashcards9Learners -
(9L0-3021-ENU) Apple Device Support Exam
(9L0-3021-ENU) Apple Device Support Exam
By: Mr. E M
Introduction to the Apple Ecosystem, iCloud, Two-Factor Authentication for Apple ID ...30Decks28Flashcards357Learners -
GBE
GBE
By: Sana Hashemi
HIEBP - evidence based practise, HIEBP - implementation science, HIEBP - when evidence is not implemented ...58Decks1,333Flashcards2Learners -
Security+ GCGH Chapter 11, Implementing Policies to Mitigate Risks
Security+ GCGH Chapter 11, Implementing Policies to Mitigate Risks
By: StuffOffYouStuff .
Exploring Security Policies, Agreement Types, Protecting Data ...5Decks47Flashcards1Learner -
CIPP/E
CIPP/E
By: Sara Sullivan
Module 1: Data Protection Laws, Institutions, Data Protection Law & Regulation3Decks56Flashcards3Learners -
Year 4
Year 4
By: Malgorzata Szymaniak
Ear presentations, Creepy crawlies, Persistent headaches ...100Decks1,866Flashcards1Learner -
SC - 900 Microsoft Security, Compliance, and Identity Fundamentals
SC - 900 Microsoft Security, Compliance, and Identity Fundamentals
By: 3DPD Unknown
Describe security and compliance concepts, Describe identity concepts, Describe the services and identity types of Azure AD ...17Decks665Flashcards9Learners -
Law Internet
Law Internet
By: ASHLIE ROBINSON
Data Protection1Decks50Flashcards1Learner -
Security+ (SY0-701)
Security+ (SY0-701)
By: Emmanuel Barber-Thomas
Lesson 1: Summarize Fundamental Security Concepts, Lesson 2: Compare Threat Types, Lesson 3: Explain Cryptographic Solutions ...22Decks1,650Flashcards74Learners -
Law
Law
By: Charlotte Hamilton
Criminal law, employment, data protection and intellectual property law, insolvency ...5Decks87Flashcards1Learner -
My Az-204
My Az-204
By: Adrienne Sonder
Backup And Data Protection, Implement IaaS solutions, provision vms, Implement IaaS solutions, ARM templates ...13Decks432Flashcards2Learners -
MIS 2000
MIS 2000
By: Shaun Moore
Chapter 1: Information Systems in Business, Chapter 2: Computers and Their Business Application, Chapter 3: Data and Business Intelligence ...13Decks468Flashcards1Learner -
Forensic Accounting
Forensic Accounting
By: Christina Ferrari
Chapter 2 - Why People Commit Fraud, Chapter 1 - The Nature of Fraud, Chapter 3 - Fighting Fraud: An Overview ...9Decks166Flashcards49Learners -
AZ 500
AZ 500
By: Melissa Smith
Manage Identity and Access, Implement Platform Protection, Secure Your Data and Applications ...5Decks88Flashcards6Learners -
LEVEL 6 Regulation and Compliance
LEVEL 6 Regulation and Compliance
By: Rachel Brooker
REGULATORY FRAMEWORK, GLOSSARY, Regulatory Framework - European Regulation ...17Decks683Flashcards2Learners -
Information Privacy
Information Privacy
By: Kevin Anthony
Privacy Concepts, Privacy Notice, Federal Trade Commission (FTC) Privacy Enforcement ...11Decks85Flashcards1Learner -
Engineering Management and Law
Engineering Management and Law
By: Ben Boyce
Week 1: Introduction, Professional Bodies, Self-Management and Company Lifecycle, Week 2: Management Accounting and Finance, Week 3: The English Legal System, Contract Law ...9Decks902Flashcards14Learners -
A2 Leisure Studies Unit 5
A2 Leisure Studies Unit 5
By: Sarah Nelmes
5.1 Employment practices in leisure, 5.2 recruitment and selection in leisure, 5.3 Employment issues in leisure ...17Decks292Flashcards15Learners -
SnowFlake
SnowFlake
By: Sunny Patel
SnowFlake Overview & Architecture, Storage Layer, Compute Layer ...12Decks160Flashcards1Learner -
1.5.1. Computing related legislation
1.5.1. Computing related legislation
By: Alexis-Rose Brighton
Data protection 1998, RIPD 2000, Computer Misuse Act 19903Decks18Flashcards1Learner -
HSPH
HSPH
By: Emilia McColm
The Epidemiological Approach, Interpreting Data, Randomised Controlled Trials ...29Decks951Flashcards11Learners -
Digital Innovation
Digital Innovation
By: rebecka otter
1. Introduction to Innovation, 2. Business Model Innovation (BMI), 3. Open Innovation ...14Decks160Flashcards2Learners -
Security +
Security +
By: Chris Quinn
Chapter 3a - Networking, Chapter 3b - Protocols, Miscellaneous ...13Decks553Flashcards1Learner -
PLS
PLS
By: Unknown Unknown
Introductie, Bewustwording, rechten en verwerking, Wat is goed handelen en waarom privacy ...10Decks117Flashcards4Learners -
GHW APC
GHW APC
By: George Williams
Use Classes, Planning and Development Managment, Case Study ...15Decks164Flashcards2Learners -
Sec+ Study Deck
Sec+ Study Deck
By: Destiny Lester
Fundamentals Of Security, Threat Actors, Physical Security ...7Decks208Flashcards1Learner -
Privacy In Public: Big Data, Self-tracking, Social Networks
Privacy In Public: Big Data, Self-tracking, Social Networks
By: Puck Charlotte
Week 1 - Privacy In Public, Week 2 - Online Tracking And Microtargeting, Week 3 - Self Tracking Privacy And Autonomy ...5Decks186Flashcards1Learner -
F102
F102
By: Gabbi Knipe
Part 4 questions, Revision, Lists ...29Decks441Flashcards1Learner