Learn Data Protection
Study Data Protection using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Security+ GCGH Chapter 5, Securing Hosts & Data
Security+ GCGH Chapter 5, Securing Hosts & Data
By: StuffOffYouStuff .
Implementing Secure Systems, Deploying Mobile Devices Securely, Embedded Systems4Decks43Flashcards1Learner -
Security and Programming Paradigms
Security and Programming Paradigms
By: Ab Up
Security Basics, Programming Paradigm basics, Input threats16Decks226Flashcards1Learner -
APC
APC
By: Caspar Courage
Leasehold Reform Act, RICS, Health & Safety17Decks287Flashcards6Learners -
ICT
ICT
By: Kai egg
Protocols, Storage devices, operating system11Decks66Flashcards2Learners -
Cybersecurity
Cybersecurity
By: Tom van Eijk
Introduction - Week 1, Risk Management and Control, Encryption7Decks95Flashcards1Learner -
Microsoft Azure ⭐️ Fundamentals (AZ-900)
Microsoft Azure ⭐️ Fundamentals (AZ-900)
By: Denis C
Module 0 - Core Cloud Concepts, Module 1a - Understanding Azure Architecture and Management - General Concepts, Module 1b - Understanding Azure Architecture and Management - Geographies, Regions and Zones38Decks644Flashcards76Learners -
CIPP/E
CIPP/E
By: Kezia Jeffreys
Origins and Historical Context of Data Protection Law1Decks28Flashcards7Learners -
Computing - Organised
Computing - Organised
By: Zayd IMRAN
Computer Systems - Translators, Data Representation - Logic Gates, Data Representation - Units22Decks361Flashcards1Learner -
CompTIA Security+
CompTIA Security+
By: Rene Vargas
Chapter 2 - Monitoring Networks, Chapter 1 - Measuring and Weighing Risk, Chapter 3 - Understanding Devices and infrastructure12Decks292Flashcards51Learners -
IT systems
IT systems
By: Usman AK
A2 - Part 1, A2 - Part 2 Storage devices, A2 - Part 3 Accessibility Devices and Data Processess18Decks232Flashcards3Learners -
LEVEL 6 Regulation and Compliance
LEVEL 6 Regulation and Compliance
By: Rachel Brooker
REGULATORY FRAMEWORK, GLOSSARY, Regulatory Framework - European Regulation17Decks683Flashcards2Learners -
ICAEW Law: QB2020
ICAEW Law: QB2020
By: Robert Owen
01: Contract formation., 02: Termination of contract., 03. Agency.11Decks661Flashcards4Learners -
CEI Basic (HR Recruiter)
CEI Basic (HR Recruiter)
By: Angelina Ong
Employment Agencies Regulatory Framework (general), Employment Of Foreign Manpower Act (FDW), Human Trafficking12Decks776Flashcards7Learners -
Network + Exam N10-008
Network + Exam N10-008
By: Melissa Nyberg
Chapter 1: Network Models, Chapter 2: Cabling and Topology, Chapter 3: Ethernet Basics20Decks793Flashcards1Learner -
Year 4
Year 4
By: Malgorzata Szymaniak
Ear presentations, Creepy crawlies, Persistent headaches86Decks1,697Flashcards1Learner -
CAS Exam Prep
CAS Exam Prep
By: Callum Fradley
AH Bribery Policy & Procedures, AH Data Protection Policy, Counter fraud awareness & reporting13Decks145Flashcards1Learner -
Health and Social
Health and Social
By: Rebecca Edmondson
The Data Protection Act 19981Decks17Flashcards7Learners -
(9L0-3021-ENU) Apple Device Support Exam
(9L0-3021-ENU) Apple Device Support Exam
By: Mr. E M
Introduction to the Apple Ecosystem, iCloud, Two-Factor Authentication for Apple ID30Decks28Flashcards349Learners -
Data Privacy & Law
Data Privacy & Law
By: Satinder Kaur Sidhu
Important Concepts - Week 1, Reading Week 2, Reading week 38Decks281Flashcards1Learner -
Technology And Data Risks
Technology And Data Risks
By: Roger Chetwynd
Introduction, Automation Capabilities, Availability Of App9Decks31Flashcards1Learner -
CIPP/CIPT
CIPP/CIPT
By: Arejv Cibab
1. Origins and Development of European Data Protection Law, 2. European Union Institutions, 1. & 2. Privacy10Decks331Flashcards3Learners -
Security+ GCGH Chapter 11, Implementing Policies to Mitigate Risks
Security+ GCGH Chapter 11, Implementing Policies to Mitigate Risks
By: StuffOffYouStuff .
Exploring Security Policies, Agreement Types, Protecting Data5Decks47Flashcards1Learner -
Privacy In Public: Big Data, Self-tracking, Social Networks
Privacy In Public: Big Data, Self-tracking, Social Networks
By: Puck Charlotte
Week 1 - Privacy In Public, Week 2 - Online Tracking And Microtargeting, Week 3 - Self Tracking Privacy And Autonomy5Decks186Flashcards1Learner -
CIPP/E
CIPP/E
By: Ashley Pusey
Origins & Development of European Data Protection Law1Decks25Flashcards9Learners -
Forensic Accounting
Forensic Accounting
By: Christina Ferrari
Chapter 2 - Why People Commit Fraud, Chapter 1 - The Nature of Fraud, Chapter 3 - Fighting Fraud: An Overview9Decks166Flashcards48Learners -
Snowflake SnowPro Core Certificates
Snowflake SnowPro Core Certificates
By: Billie Hurley
Snowflake Overview and Architecture | Performance and Tuning, Snowflake Virtual Warehouses ||Snowflake virtual warehouses || Snowflake storage and Protection, Snowflake data movement | account and security | semi-structured3Decks303Flashcards8Learners -
My Az-204
My Az-204
By: Adrienne Sonder
Backup And Data Protection, Implement IaaS solutions, provision vms, Implement IaaS solutions, ARM templates13Decks432Flashcards2Learners -
GDPR
GDPR
By: Amalie Østergaard
Data Protection Concepts, Territorial and Material Scope2Decks34Flashcards7Learners -
A2 Leisure Studies Unit 5
A2 Leisure Studies Unit 5
By: Sarah Nelmes
5.1 Employment practices in leisure, 5.2 recruitment and selection in leisure, 5.3 Employment issues in leisure17Decks292Flashcards15Learners -
MIS 2000
MIS 2000
By: Shaun Moore
Chapter 1: Information Systems in Business, Chapter 2: Computers and Their Business Application, Chapter 3: Data and Business Intelligence13Decks468Flashcards1Learner