Privacy Management (Open)

Privacy Management (Open)

Course modules

0. Course introduction

0. Course introduction
Module completed Module in progress Module locked
0. Course introduction 11358    
  • Welcome to Privacy Management!
    Welcome to Privacy Management! Welcome to Privacy Management!
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Introduction of the Lecturer: Dr. Lothar Fritsch
    Introduction of the Lecturer: Dr. Lothar Fritsch Introduction of the Lecturer: Dr. Lothar Fritsch
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Introduce yourself!
    Introduce yourself! Introduce yourself!
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Course learning goals
    Course learning goals Course learning goals
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Learning with this course: Expectations and guidance
    Learning with this course: Expectations and guidance Learning with this course: Expectations and guidance
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • The CANVAS learning platform
    The CANVAS learning platform The CANVAS learning platform
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Communication policy for interaction with staff and peers
    Communication policy for interaction with staff and peers Communication policy for interaction with staff and peers
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

1: The big picture

1: The big picture
Module completed Module in progress Module locked
1: The big picture 11360    
  • Preparatory reading on data protection
    Preparatory reading on data protection Preparatory reading on data protection
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Context of privacy management
    Context of privacy management Context of privacy management
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • What is "Privacy"?
    What is "Privacy"? What is "Privacy"?
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • What is "Data Protection"?
    What is "Data Protection"? What is "Data Protection"?
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Stakeholders and forces
    Stakeholders and forces Stakeholders and forces
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Privacy & Technology
    Privacy & Technology Privacy & Technology
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Privacy management approaches
    Privacy management approaches Privacy management approaches
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • IT Management: Plan-Do-Check-Act cycle
    IT Management: Plan-Do-Check-Act cycle IT Management: Plan-Do-Check-Act cycle
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • LINDDUN method for threat-based privacy design
    LINDDUN method for threat-based privacy design LINDDUN method for threat-based privacy design
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Privacy by Design
    Privacy by Design Privacy by Design
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • OASIS privacy management: Privacy by Design for Software Engineering
    OASIS privacy management: Privacy by Design for Software Engineering OASIS privacy management: Privacy by Design for Software Engineering
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Further reading
    Further reading Further reading
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Quiz 1
    Quiz 1 Quiz 1
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

2: The concept of "managed privacy"

2: The concept of "managed privacy"
Module completed Module in progress Module locked
2: The concept of "managed privacy" 11363    
  • Preparatory reading on the concept of managed privacy
    Preparatory reading on the concept of managed privacy Preparatory reading on the concept of managed privacy
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Will PETS solve the problem? An excursion into privacy enhancing technology
    Will PETS solve the problem? An excursion into privacy enhancing technology Will PETS solve the problem? An excursion into privacy enhancing technology
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Limitations of PETs in practice
    Limitations of PETs in practice Limitations of PETs in practice
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Privacy management: data, processes and administration
    Privacy management: data, processes and administration Privacy management: data, processes and administration
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Assignment: Handling legacy data
    Assignment: Handling legacy data Assignment: Handling legacy data
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Further reading on privacy management
    Further reading on privacy management Further reading on privacy management
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

3. Privacy Impact Assessment and Privacy Risk Analysis as integral part of privacy management

3. Privacy Impact Assessment and Privacy Risk Analysis as integral part of privacy management
Module completed Module in progress Module locked
3. Privacy Impact Assessment and Privacy Risk Analysis as integral part of privacy management 11365    
  • Preparatory reading on privacy impact assessment and privacy risks
    Preparatory reading on privacy impact assessment and privacy risks Preparatory reading on privacy impact assessment and privacy risks
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Privacy Impact Assessment (PIA)
    Privacy Impact Assessment (PIA) Privacy Impact Assessment (PIA)
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Privacy Risk Analysis
    Privacy Risk Analysis Privacy Risk Analysis
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Privacy threat lists and privacy risk information
    Privacy threat lists and privacy risk information Privacy threat lists and privacy risk information
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • PIA and risk assessment quiz
    PIA and risk assessment quiz PIA and risk assessment quiz
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

4. Privacy controls

4. Privacy controls
Module completed Module in progress Module locked
4. Privacy controls 11367    
  • Preparatory reading about Privacy Controls
    Preparatory reading about Privacy Controls Preparatory reading about Privacy Controls
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • The concept of privacy controls
    The concept of privacy controls The concept of privacy controls
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Risk treatment with privacy controls
    Risk treatment with privacy controls Risk treatment with privacy controls
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Properties of privacy controls
    Properties of privacy controls Properties of privacy controls
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Selection criteria for privacy controls
    Selection criteria for privacy controls Selection criteria for privacy controls
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Privacy controls quiz
    Privacy controls quiz Privacy controls quiz
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

5. Final examination - case study (enrolled for-credit students)

5. Final examination - case study (enrolled for-credit students)
Module completed Module in progress Module locked
5. Final examination - case study (enrolled for-credit students) 11370    
  • Introduction
    Introduction Introduction
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Scenario description: Mobile dating with certified e-ID
    Scenario description: Mobile dating with certified e-ID Scenario description: Mobile dating with certified e-ID
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Assignment: Impact assessment, risk assessment, control selection
    Assignment: Impact assessment, risk assessment, control selection Assignment: Impact assessment, risk assessment, control selection
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Summary

Summary
Module completed Module in progress Module locked
Summary 11372    
  • Privacy in the life cycle of IT management
    Privacy in the life cycle of IT management Privacy in the life cycle of IT management
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Management summary
    Management summary Management summary
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Supplementary reading

Supplementary reading
Module completed Module in progress Module locked
Supplementary reading 11373    
  • References to privacy engineering
    References to privacy engineering References to privacy engineering
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • References to GDPR
    References to GDPR References to GDPR
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Privacy policies and notifications
    Privacy policies and notifications Privacy policies and notifications
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
 
minimum score must view must submit must contribute
CC attribution This course content is offered under a CC attribution license. Content in this course can be considered under this license unless otherwise noted.