Learn Data Protection
Study Data Protection using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
My CIPP/E 01.02.2025
My CIPP/E 01.02.2025
By: Sekgabo Malefho
Chapter 1 Origins and Development of European Data Protection Law, Chapter 2 EU Institutions, Chapter 3 Legislative Framework ...7Decks228Flashcards1Learner -
Main Summaries Revision
Main Summaries Revision
By: Abby Scandrett
H&S, Accounting, Measurement ...7Decks209Flashcards1Learner -
GDPR
GDPR
By: Amalie Østergaard
Data Protection Concepts, Territorial and Material Scope2Decks34Flashcards9Learners -
Revision
Revision
By: Kezia Jeffreys
Module 1: Data Protection Laws, Module 2: Personal Data, Module 3: Controllers & Processors ...7Decks209Flashcards3Learners -
APC
APC
By: Harry Blansh
Valuation, Estate Agency Legislation, Accounting Principles ...11Decks126Flashcards21Learners -
Microsoft Azure ⭐️ Fundamentals (AZ-900)
Microsoft Azure ⭐️ Fundamentals (AZ-900)
By: Denis C
Module 0 - Core Cloud Concepts, Module 1a - Understanding Azure Architecture and Management - General Concepts, Module 1b - Understanding Azure Architecture and Management - Geographies, Regions and Zones ...38Decks644Flashcards258Learners -
Security+
Security+
By: Kevin Nunes
Module 01 - Security Concepts, Module 02 - Threats, Vulnerabilities, and Mitigations, Module 03 - Criptography ...13Decks1,391Flashcards1Learner -
Google
Google
By: Benjamin Kavanagh
Compute, Storage, Databases ...22Decks157Flashcards153Learners -
Law
Law
By: Jonty hart
1. Contract Formation, 2. Contract Termination, 3. Agency and Negligence ...9Decks324Flashcards5Learners -
HATTIE APC REVISION
HATTIE APC REVISION
By: Harriet Crooks
Valuation, Health and Safety, Housing Strategy and Provision ...22Decks778Flashcards1Learner -
CIPM 2023
CIPM 2023
By: Jamison Schmidt
Privacy Program Management: Chapter 1 Intro to program management, Privacy Program Management: Chapter 2 Frameworks and Governance, Privacy Operational Life Cycle: Chapter 4 Assess ...10Decks153Flashcards15Learners -
ICT
ICT
By: Kai egg
Protocols, Storage devices, operating system ...11Decks66Flashcards2Learners -
Snowflake SnowPro Core Certificates
Snowflake SnowPro Core Certificates
By: Billie Hurley
Snowflake Overview and Architecture | Performance and Tuning, Snowflake Virtual Warehouses ||Snowflake virtual warehouses || Snowflake storage and Protection, Snowflake data movement | account and security | semi-structured3Decks303Flashcards12Learners -
Security+ Cert Darril Gibson
Security+ Cert Darril Gibson
By: IT Consultant Allen
Chapter 1 Mastering Security Basics, Other Questions, Chapter 2 Understanding Identity and Access Management ...12Decks307Flashcards12Learners -
IT systems
IT systems
By: Usman AK
A2 - Part 1, A2 - Part 2 Storage devices, A2 - Part 3 Accessibility Devices and Data Processess ...18Decks232Flashcards4Learners -
Block 3
Block 3
By: frankiespeck@hotmail.co.uk Speck
Introduction To CNS Anatomy, Health Beliefs, Cells & Communication In The Nervous System ...40Decks1,882Flashcards4Learners -
SC - 900 Microsoft Security, Compliance, and Identity Fundamentals
SC - 900 Microsoft Security, Compliance, and Identity Fundamentals
By: 3DPD Unknown
Describe security and compliance concepts, Describe identity concepts, Describe the services and identity types of Azure AD ...17Decks665Flashcards23Learners -
Cybersecurity
Cybersecurity
By: Tom van Eijk
Introduction - Week 1, Risk Management and Control, Encryption ...7Decks95Flashcards1Learner -
Security+ (SY0-701)
Security+ (SY0-701)
By: Emmanuel Barber-Thomas
Lesson 1: Summarize Fundamental Security Concepts, Lesson 2: Compare Threat Types, Lesson 3: Explain Cryptographic Solutions ...22Decks1,650Flashcards431Learners -
Security and Programming Paradigms
Security and Programming Paradigms
By: Ab Up
Security Basics, Programming Paradigm basics, Input threats ...16Decks226Flashcards1Learner -
GCSE ICT
GCSE ICT
By: Ryan Lynch
Data protection act, Computer Misuse Act, Copyright, Design and Patents Act3Decks15Flashcards4Learners -
Microsoft Purview
Microsoft Purview
By: Jason Swift
Information Protection and Governance, Sensitivity Labels, Data Loss Prevention3Decks56Flashcards1Learner -
ICAEW Law: QB2020
ICAEW Law: QB2020
By: Robert Owen
01: Contract formation., 02: Termination of contract., 03. Agency. ...11Decks661Flashcards5Learners -
Module 7
Module 7
By: April Segal
ENDO Retreatment procedures, REM PROS communication with lab, SPECIAL CARE physical disability ...72Decks2,499Flashcards4Learners -
Law
Law
By: Mark Vrijhof
Module 1: Introduction to Law, Module 2: Private Law, Module 3: IP law ...5Decks105Flashcards1Learner -
CIPP/E
CIPP/E
By: Kezia Jeffreys
Origins and Historical Context of Data Protection Law1Decks28Flashcards7Learners -
Cybersecurity
Cybersecurity
By: chris breed
Chapter 2 Identity and Access management, Chapter 3 Exploring network technologies and tools, Chapter 4 Securing your network ...13Decks429Flashcards1Learner -
CompTIA Security+
CompTIA Security+
By: Rene Vargas
Chapter 2 - Monitoring Networks, Chapter 1 - Measuring and Weighing Risk, Chapter 3 - Understanding Devices and infrastructure ...12Decks292Flashcards51Learners -
Comptia Security +
Comptia Security +
By: Dan Ross
Fundamentals of Security, Threat Actors, Physical Security ...14Decks503Flashcards1Learner -
CAS Exam Prep
CAS Exam Prep
By: Callum Fradley
AH Bribery Policy & Procedures, AH Data Protection Policy, Counter fraud awareness & reporting ...13Decks145Flashcards1Learner