Protecting Personal Data in the Cloud-Lesson One: What is data protection law?
Introduction to data protection and cybersecurity
()
Introducing Christopher and Dimitra
Glossary of Key Terms
What is personal data?
()
The definition of personal data
Who are the main GDPR actors?
()
The main actors under the GDPR
Protecting Personal Data in the Cloud-Lesson Two: Data protection principles and lawful processing
What are the data protection principles?
()
Data Protection Principles
What is lawful processing?
()
Lawful processing
Protecting Personal Data in the Cloud-Lesson Three: Joint controllers and the controller-processor relationship
What do we mean by 'joint' controllers?
()
Joint controllers
What is the relationship between controllers and processors?
()
Relationship between controllers and processors
Protecting Personal Data in the Cloud-Lesson Four: Data security and individual rights
What are the security obligations?
()
Security and personal data breach
What are individual rights?
()
Individual rights
Protecting Personal Data in the Cloud-Lesson Five: Fines and Compensation
What are the GDPR provisions on fines and compensation?
()
Fines and compensation
Protecting Personal Data in the Cloud-Lesson Six: Graded Quiz
A message from your instructors
International Data Transfers and Cloud Services-Lesson One: Introduction
Introduction to International Data Transfers
()
Glossary of key terms
International Data Transfers and Cloud Services-Lesson Two: Territorial scope of the GDPR
The Establishment Test
()
Targeting and Monitoring
()
Duty to appoint a representative
Other consequences of applying the GDPR
International Data Transfers and Cloud Services-Lesson Three: Third country transfers of personal data
Third country transfer restriction
()
What is a transfer?
()
International Data Transfers and Cloud Services-Lesson Four: Transfer instruments and derogations from the transfer restriction
Transfer options
()
Lawful basis for the transfer of personal data
Adequacy decisions
()
The EU-US Data Privacy Framework
Appropriate Safeguards
()
Binding Corporate Rules
Derogations
()
Derogations from the third country data transfer restriction
International Data Transfers and Cloud Services-Lesson Five: Conclusions & Graded Quiz
Data Transfers Conclusion
()
Data Location Services
Cybersecurity, Cloud, and Critical Infrastructure-Lesson One: Introduction to the NIS Directive
Introduction to the regulation of critical infrastructure
()
Introducing: Ian and Dave
What is critical infrastructure?
()
Regulating Digital Service Providers
The NIS2 Directive (Update, April 2023)
Cybersecurity, Cloud, and Critical Infrastructure-Lesson Two: Cloud Services and the NIS Directive
How does the NIS Directive define 'cloud'?
()
Regulating 'cloud' services
Cybersecurity, Cloud, and Critical Infrastructure-Lesson Three: Incident notification
Must cloud providers notify security incidents?
()
Incident notification under the NIS Directive
Cybersecurity, Cloud, and Critical Infrastructure-Lesson Four: Safeguarding obligations
Must cloud providers secure their service?
()
Regulating risk management
Cybersecurity, Cloud, and Critical Infrastructure-Lesson Five: Enforcement and penalties
How is the NIS Directive enforced?
()
Who enforces the NIS Directive?
()
Jurisdiction and enforcement
Cybersecurity, Cloud, and Critical Infrastructure-Lesson Six: Graded Quiz
NIS2 Directive in Substance (Update, April 2023)
Congratulations from your instructors