Privacy Management (Open)
Privacy Management (Open)
Course modules
0. Course introduction
0. Course introduction
Module completed
Module in progress
Module locked
-
PageWelcome to Privacy Management! Welcome to Privacy Management!Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageIntroduction of the Lecturer: Dr. Lothar Fritsch Introduction of the Lecturer: Dr. Lothar FritschScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageCourse learning goals Course learning goalsScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageLearning with this course: Expectations and guidance Learning with this course: Expectations and guidanceScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageThe CANVAS learning platform The CANVAS learning platformScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageCommunication policy for interaction with staff and peers Communication policy for interaction with staff and peersScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
1: The big picture
1: The big picture
Module completed
Module in progress
Module locked
-
PagePreparatory reading on data protection Preparatory reading on data protectionScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageContext of privacy management Context of privacy managementScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageWhat is "Privacy"? What is "Privacy"?Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageWhat is "Data Protection"? What is "Data Protection"?Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageStakeholders and forces Stakeholders and forcesScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PagePrivacy & Technology Privacy & TechnologyScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PagePrivacy management approaches Privacy management approachesScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageIT Management: Plan-Do-Check-Act cycle IT Management: Plan-Do-Check-Act cycleScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageLINDDUN method for threat-based privacy design LINDDUN method for threat-based privacy designScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PagePrivacy by Design Privacy by DesignScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageOASIS privacy management: Privacy by Design for Software Engineering OASIS privacy management: Privacy by Design for Software EngineeringScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageFurther reading Further readingScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
QuizQuiz 1 Quiz 1Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
2: The concept of "managed privacy"
2: The concept of "managed privacy"
Module completed
Module in progress
Module locked
-
PagePreparatory reading on the concept of managed privacy Preparatory reading on the concept of managed privacyScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageWill PETS solve the problem? An excursion into privacy enhancing technology Will PETS solve the problem? An excursion into privacy enhancing technologyScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageLimitations of PETs in practice Limitations of PETs in practiceScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PagePrivacy management: data, processes and administration Privacy management: data, processes and administrationScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageFurther reading on privacy management Further reading on privacy managementScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
3. Privacy Impact Assessment and Privacy Risk Analysis as integral part of privacy management
3. Privacy Impact Assessment and Privacy Risk Analysis as integral part of privacy management
Module completed
Module in progress
Module locked
-
PagePreparatory reading on privacy impact assessment and privacy risks Preparatory reading on privacy impact assessment and privacy risksScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PagePrivacy Impact Assessment (PIA) Privacy Impact Assessment (PIA)Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PagePrivacy Risk Analysis Privacy Risk AnalysisScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PagePrivacy threat lists and privacy risk information Privacy threat lists and privacy risk informationScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
QuizPIA and risk assessment quiz PIA and risk assessment quizScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
4. Privacy controls
4. Privacy controls
Module completed
Module in progress
Module locked
-
PagePreparatory reading about Privacy Controls Preparatory reading about Privacy ControlsScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageThe concept of privacy controls The concept of privacy controlsScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageRisk treatment with privacy controls Risk treatment with privacy controlsScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageProperties of privacy controls Properties of privacy controlsScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageSelection criteria for privacy controls Selection criteria for privacy controlsScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
QuizPrivacy controls quiz Privacy controls quizScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
5. Final examination - case study (enrolled for-credit students)
5. Final examination - case study (enrolled for-credit students)
Module completed
Module in progress
Module locked
-
PageIntroduction IntroductionScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageScenario description: Mobile dating with certified e-ID Scenario description: Mobile dating with certified e-IDScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Summary
Summary
Module completed
Module in progress
Module locked
-
PagePrivacy in the life cycle of IT management Privacy in the life cycle of IT managementScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageManagement summary Management summaryScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Supplementary reading
Supplementary reading
Module completed
Module in progress
Module locked
-
PageReferences to privacy engineering References to privacy engineeringScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageReferences to GDPR References to GDPRScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PagePrivacy policies and notifications Privacy policies and notificationsScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
This course content is offered under a CC attribution license. Content in this course can be considered under this license unless otherwise noted.