Fundamentals of information privacy
Reviews the modern history of privacy, foundational privacy concepts, data protection roles and fair information practices; explores the impacts of privacy and data protection regulations on information management.
Privacy in the IT environment
Describes compliance requirements, IT risks, and stakeholder privacy expectations; differentiates between privacy and security.
Core privacy concepts
Explains foundational elements for embedding privacy in IT and provides an overview of common privacy principles; summarizes data protection by design and default.
Privacy considerations in the information life cycle
Explores privacy considerations throughout the stages of the information life cycle.
Privacy in systems and applications
Examines the risks inherent in the IT environment and options for addressing them, including: identity and access management; credit card information and processing; remote access, BYOD and telecommuting; data encryption; and other privacy-enhancing technologies in the enterprise environment.
Describes the strengths and weaknesses of authentication techniques as well as the use of identifiers; reviews and illustrates privacy by design.
Online privacy issues
Explores the unique challenges that come from online privacy issues, including specific laws and regulations, online threats, social media, e-commerce, tracking technologies, and web security protocols.
Technologies with privacy considerations
Describes specific privacy considerations associated with a variety of technologies including cloud computing, wireless IDs, location-based services, “smart” technologies, video/data/audio surveillance, and biometric recognition.