Privacy Management (Open)

Privacy Management (Open)

Course modules

0. Course introduction

0. Course introduction
Module completed Module in progress Module locked
0. Course introduction 11358  
  • Page
    Welcome to Privacy Management! Welcome to Privacy Management!
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    Introduction of the Lecturer: Dr. Lothar Fritsch Introduction of the Lecturer: Dr. Lothar Fritsch
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Assignment
    Introduce yourself! Introduce yourself!
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    Course learning goals Course learning goals
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    Learning with this course: Expectations and guidance Learning with this course: Expectations and guidance
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    The CANVAS learning platform The CANVAS learning platform
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    Communication policy for interaction with staff and peers Communication policy for interaction with staff and peers
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

1: The big picture

1: The big picture
Module completed Module in progress Module locked
1: The big picture 11360  
  • Page
    Preparatory reading on data protection Preparatory reading on data protection
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    Context of privacy management Context of privacy management
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    What is "Privacy"? What is "Privacy"?
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    What is "Data Protection"? What is "Data Protection"?
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    Stakeholders and forces Stakeholders and forces
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    Privacy & Technology Privacy & Technology
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    Privacy management approaches Privacy management approaches
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    IT Management: Plan-Do-Check-Act cycle IT Management: Plan-Do-Check-Act cycle
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    LINDDUN method for threat-based privacy design LINDDUN method for threat-based privacy design
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    Privacy by Design Privacy by Design
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    OASIS privacy management: Privacy by Design for Software Engineering OASIS privacy management: Privacy by Design for Software Engineering
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    Further reading Further reading
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Quiz
    Quiz 1 Quiz 1
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

2: The concept of "managed privacy"

2: The concept of "managed privacy"
Module completed Module in progress Module locked
2: The concept of "managed privacy" 11363  
  • Page
    Preparatory reading on the concept of managed privacy Preparatory reading on the concept of managed privacy
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    Will PETS solve the problem? An excursion into privacy enhancing technology Will PETS solve the problem? An excursion into privacy enhancing technology
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    Limitations of PETs in practice Limitations of PETs in practice
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    Privacy management: data, processes and administration Privacy management: data, processes and administration
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Assignment
    Assignment: Handling legacy data Assignment: Handling legacy data
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    Further reading on privacy management Further reading on privacy management
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

3. Privacy Impact Assessment and Privacy Risk Analysis as integral part of privacy management

3. Privacy Impact Assessment and Privacy Risk Analysis as integral part of privacy management
Module completed Module in progress Module locked
3. Privacy Impact Assessment and Privacy Risk Analysis as integral part of privacy management 11365  
  • Page
    Preparatory reading on privacy impact assessment and privacy risks Preparatory reading on privacy impact assessment and privacy risks
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    Privacy Impact Assessment (PIA) Privacy Impact Assessment (PIA)
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    Privacy Risk Analysis Privacy Risk Analysis
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    Privacy threat lists and privacy risk information Privacy threat lists and privacy risk information
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Quiz
    PIA and risk assessment quiz PIA and risk assessment quiz
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

4. Privacy controls

4. Privacy controls
Module completed Module in progress Module locked
4. Privacy controls 11367  
  • Page
    Preparatory reading about Privacy Controls Preparatory reading about Privacy Controls
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    The concept of privacy controls The concept of privacy controls
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    Risk treatment with privacy controls Risk treatment with privacy controls
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    Properties of privacy controls Properties of privacy controls
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    Selection criteria for privacy controls Selection criteria for privacy controls
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Quiz
    Privacy controls quiz Privacy controls quiz
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

5. Final examination - case study (enrolled for-credit students)

5. Final examination - case study (enrolled for-credit students)
Module completed Module in progress Module locked
5. Final examination - case study (enrolled for-credit students) 11370  
  • Page
    Introduction Introduction
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    Scenario description: Mobile dating with certified e-ID Scenario description: Mobile dating with certified e-ID
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Assignment
    Assignment: Impact assessment, risk assessment, control selection Assignment: Impact assessment, risk assessment, control selection
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Summary

Summary
Module completed Module in progress Module locked
Summary 11372  
  • Page
    Privacy in the life cycle of IT management Privacy in the life cycle of IT management
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    Management summary Management summary
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Supplementary reading

Supplementary reading
Module completed Module in progress Module locked
Supplementary reading 11373  
  • Page
    References to privacy engineering References to privacy engineering
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    References to GDPR References to GDPR
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Page
    Privacy policies and notifications Privacy policies and notifications
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark completed Must mark this module item done in order to complete Marked completed Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
 
minimum score must view must submit must contribute
CC attribution This course content is offered under a CC attribution license. Content in this course can be considered under this license unless otherwise noted.