QMUL - Cloud Computing Law: Data Protection and Cybersecurity
- Offered byCoursera
Cloud Computing Law: Data Protection and Cybersecurity at Coursera Overview
Duration | 16 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Cloud Computing Law: Data Protection and Cybersecurity at Coursera Highlights
- Earn a Certificate upon completion
Cloud Computing Law: Data Protection and Cybersecurity at Coursera Course details
- First, we?ll look at how the European Union?s ?General Data Protection Regulation? (?GDPR?) regulates the processing of personal data in cloud services
- You?ll learn to identify controllers and processors, describe their roles and responsibilities, and understand how cloud customers and providers can comply in practice
- Second, we?ll look at international transfers of personal data
- We?ll explain how the GDPR can apply to cloud providers and their customers anywhere in the world, as well as how restrictions on international transfers apply to cloud services
- Third, we?ll look at how the Network and Information Security (?NIS?) Directive regulates the cybersecurity of critical infrastructure
- You?ll learn to identify cloud providers? duties to notify security breaches and to keep their services secure, and how to apply those duties to concrete case studies
Cloud Computing Law: Data Protection and Cybersecurity at Coursera Curriculum
Protecting Personal Data in the Cloud
Introduction to data protection and cybersecurity
What is personal data?
Who are the main GDPR actors?
What are the data protection principles?
What is lawful processing?
What do we mean by 'joint' controllers?
What is the relationship between controllers and processors?
What are the security obligations?
What are individual rights?
What are the GDPR provisions on fines and compensation?
Introducing Christopher and Dimitra
Glossary of Key Terms
The definition of personal data
The main actors under the GDPR
Data Protection Principles
Lawful processing
Joint controllers
Relationship between controllers and processors
Security and personal data breach
Individual rights
Fines and compensation
A message from your instructors
Controllers, processors, and lawful grounds for processing
Controller-processor relationship and individual rights
Case Studies
International Data Transfers and Cloud Services
Introduction to International Data Transfers
The Establishment Test
Targeting and Monitoring
Third country transfer restriction
What is a transfer?
Transfer options
Adequacy decisions
Appropriate Safeguards
Derogations
Data Transfers Conclusion
Glossary of key terms
Duty to appoint a representative
Other consequences of applying the GDPR
Lawful basis for the transfer of personal data
The EU-US Data Privacy Framework
Binding Corporate Rules
Derogations from the third country data transfer restriction
Data Location Services
Establishment in the EU
Targeting and monitoring the behaviour of EU data subjects
Third country transfer restriction
Third country data transfer instruments
Case Studies
Cybersecurity, Cloud, and Critical Infrastructure
Introduction to the regulation of critical infrastructure
What is critical infrastructure?
How does the NIS Directive define 'cloud'?
Must cloud providers notify security incidents?
Must cloud providers secure their service?
How is the NIS Directive enforced?
Who enforces the NIS Directive?
Introducing: Ian and Dave
Regulating Digital Service Providers
Regulating 'cloud' services
Incident notification under the NIS Directive
Regulating risk management
Jurisdiction and enforcement
Congratulations from your instructors
Scope and Incident Notification
Jurisdiction, oversight, and enforcement
Case Studies