IBM - IBM Data Privacy for Information Architecture
- Offered byCoursera
IBM Data Privacy for Information Architecture at Coursera Overview
Duration | 10 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Official Website | Explore Free Course |
Credential | Certificate |
IBM Data Privacy for Information Architecture at Coursera Highlights
- Earn a shareable certificate upon completion.
- Flexible deadlines according to your schedule.
IBM Data Privacy for Information Architecture at Coursera Course details
- Data privacy controls how information is collected, used, shared, and disposed of, in accordance with policies or external laws and regulations. In this course, students will gain an understanding of what data privacy is along with how to identify and understand typical data protection and privatization objectives that an enterprise may have, and how to choose a data protection approach. The student will gain a background in multiple data privacy mechanisms and practices, and learn how to grow their data protection toolkit. The IBM DataFirst method will be the backbone of the discussion.
IBM Data Privacy for Information Architecture at Coursera Curriculum
IBM DataFirst Data Privacy introduction
Meet Christopher Giardina
Meet Tim Davis
Meet Paul Christensen
Transforming your business with modern data and AI architectures
What is an IBM DataFirst engagement?
Course disclaimer
IBM DataFirst Data Privacy introduction
Data governance and organizational structures
Data governance and organizational structures introduction
DataFirst
Structures and roles
Organization governance structures
Use case example
Questions to consider
Data governance and organizational structures
Dealing with regulation
Introduction to considering data privacy rights
Data protection, privacy and regulations overview
Example of a deployment
Data privacy regulations and initiatives
Exploring regulations
What is personal data?
Core Principles
A "Privacy Principles" approach
Getting started
Demonstrating compliance
Dealing with regulation - Practice quiz
Dealing with regulation
Data governance intersections
Data governance intersections introduction
Why data governance?
Private data, use case types, and governance building blocks
Key governance components: Who and what?
What is metadata?
Key governance components: Where, why, how?
Data Privacy policies and procedures examples
Example assessment guidance
Questions to consider
ODPi Egeria
Data governance intersections
Data privacy vs security
Data privacy vs security introduction
Underlying principles
The difference between data privacy and security
Privacy mechanisms
Security mechanisms
Governance driven protection and use case introduction
Test data management use case
Analytics and data science use case
Summary
An end-to-end framework for privacy at scale
Data privacy vs security
Data privatization mechanisms
Data privacy and the changing landscape
Data privatization mechanisms introduction
Personal data privatization vs. privatization of personal data
Personal data categories
Data topologies, use cases, and the data strategy perspective
Typical mechanisms overview
Data masking
Tokenization
Anonymization
Data fabrication
Personal data re-identification risk assessment
Other related approaches
Choosing privatization techniques and considerations
Data privatization mechanisms
Conducting the workshop
Conducting the workshop introduction
DataFirst engagement
The agenda
The participants
Day one
Days two and three
Days four and five
Typical work products and deliverables
High level data flow approach
Breakdown of processes approach
People, process, and technology views
Drill down approach
Roadmap guidance example
Conducting the workshop