SlideShare une entreprise Scribd logo
1  sur  11
.
P. Afrid khan
(2023002100)
• The data privacy in the
digital age refers to how we
protect and control our
personal information when
we use the internet and
digital services. It involves
ensuring that our data is not
misused, shared without our
consent, or accessed by
unauthorized parties. Think
of it as locking your digital
doors to keep your private
information safe! 🔒🌐
PITCH DECK 2
3
Data privacy has a rich history, shaped by technological advancements, societal
changes, and legal developments. Here are some key milestones:
1.Privacy as a Fundamental Right: The concept of privacy emerged in the late
19th century. Warren and Brandeis, in their influential 1890 article, argued that
individuals have a right to be left alone and control their personal information.
2.Computerization and Digital Age: The advent of computers and digital data
storage in the mid-20th century intensified privacy concerns. Organizations
collect and process vast amounts of personal data without explicit consent.
3.Fair Information Practices (FIPs): In the 1970s, the U.S. Department of
Health, Education, and Welfare proposed FIPs, emphasizing principles like
notice, consent, and data minimization. These principles laid the groundwork for
modern privacy frameworks.
1.Proliferation of Data Breaches:
1. As technology advances, so do cyber threats. Data breaches expose sensitive information, affecting individuals and
organizations alike.
2. Cybercriminals exploit vulnerabilities, leading to leaks of personal data, financial records, and intellectual property.
2.Tracking and Profiling by Companies:
1. Companies collect vast amounts of user data for targeted advertising, personalization, and analytics.
2. While this enhances user experience, it raises concerns about privacy, consent, and the potential misuse of personal
information.
3.Risks of Surveillance and Government Intrusion:
1. Surveillance technologies, both public and private, monitor our digital lives. Governments use them for security, but they
can infringe on civil liberties.
2. Balancing security with privacy rights remains a delicate challenge.
In this interconnected world, safeguarding privacy requires a delicate dance between innovation and protection.
PITCH DECK 4
1. Encryption is the process of converting plaintext data into a secure, unreadable format (ciphertext) using cryptographic algorithms.
2. Purpose:
1. Confidentiality: Encrypting data ensures that only authorized parties can decipher and access it.
2. Integrity: It prevents unauthorized modifications during data transmission or storage.
3. Examples:
1. Symmetric Encryption: Uses a single secret key for both encryption and decryption (e.g., AES).
2. Asymmetric Encryption: Involves a key pair (public and private keys) for secure communication (e.g., RSA).
1.Anonymization:
1. Definition: Anonymization removes or alters personally identifiable information (PII) from datasets to protect privacy.
2. Purpose:
1. Privacy Compliance: Helps organizations comply with regulations (e.g., GDPR) by minimizing the risk of re-identification.
2. Data Sharing: Enables sharing of aggregated or masked data for research or analytics.
3. Techniques:
1. Pseudonymization: Replaces identifiable data with pseudonyms (e.g., replacing names with unique codes).
2. Generalization: Aggregates data (e.g., age ranges instead of exact ages).
3. Randomization: Introduces noise or randomness to prevent re-identification.
2.Secure Data Transfer Protocols:
1. Definition: These protocols ensure data integrity and confidentiality during transmission.
2. Examples:
1. HTTPS (Hypertext Transfer Protocol Secure): Encrypts data exchanged between a user’s browser and a web server.
2. SFTP (Secure File Transfer Protocol): Provides secure file transfers over SSH.
3. TLS/SSL (Transport Layer Security/Secure Sockets Layer): Encrypts data for secure communication over networks.
Remember, implementing these technologies is crucial for safeguarding sensitive information in our interconnected world.
.
PITCH DECK 5
PITCH DECK 6
1. AI and IoT advancements pose challenges to data privacy as they increase data
collection and processing capabilities, requiring robust safeguards.
2. Future data privacy laws may focus on regulating algorithmic decision-making and
ensuring transparency in automated systems.
3. Increased emphasis on user consent and data transparency may shape future
regulations to empower individuals in controlling their personal information.
4. Stricter enforcement mechanisms and higher penalties could be implemented to
deter data privacy violations in an increasingly digitized world.
5. Collaborative efforts between governments, tech companies, and advocacy groups
may drive the development of standardized privacy frameworks to address evolving
technological landscapes.
.
.
.
.
.
.
.
.
PITCH DECK 7
.
.
.
.
.
.
.
.
PITCH DECK 8
PITCH DECK 9
This happens when data is transmitted from your organization to an
external recipient without authorization
APPS:
.
.
.
.
And many more……
PITCH DECK 10
.
Have I Been Pwned: Check if your email has been compromised in a data breach
EXPOSED https://www.exposed.lol/
Mine - The Future of Data Ownership (saymine.com)
https://www.saymine.com/
PITCH DECK 11
Name: P Afrid
Khan
(2023002100)

Contenu connexe

Similaire à data privacy in digital technology .pptx

Inria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case StudyEvelyn Donaldson
 
survey project-1
survey project-1survey project-1
survey project-1NAVIT GAUR
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfyashapnt
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information SecurityCharles Mok
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesTam Nguyen
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet ReportAhmed Mater
 
Data Protection and Privacy laws class 11
Data Protection and Privacy laws class 11Data Protection and Privacy laws class 11
Data Protection and Privacy laws class 11mufalegend
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber securityzaarahary
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodblogzilla
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 

Similaire à data privacy in digital technology .pptx (16)

Inria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directions
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case Study
 
survey project-1
survey project-1survey project-1
survey project-1
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdf
 
Chapter 1 - Introduction.pdf
Chapter 1 - Introduction.pdfChapter 1 - Introduction.pdf
Chapter 1 - Introduction.pdf
 
A01450131
A01450131A01450131
A01450131
 
DATA SOVEREIGHTY IGF.pptx
DATA SOVEREIGHTY IGF.pptxDATA SOVEREIGHTY IGF.pptx
DATA SOVEREIGHTY IGF.pptx
 
encryption.pptx
encryption.pptxencryption.pptx
encryption.pptx
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
 
Data Protection and Privacy laws class 11
Data Protection and Privacy laws class 11Data Protection and Privacy laws class 11
Data Protection and Privacy laws class 11
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 

Dernier

Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...shambhavirathore45
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
 
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...shivangimorya083
 
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girlCall Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girlkumarajju5765
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023ymrp368
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...Pooja Nehwal
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
ALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxolyaivanovalion
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Delhi Call girls
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 

Dernier (20)

Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
 
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girlCall Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
ALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptx
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 

data privacy in digital technology .pptx

  • 2. • The data privacy in the digital age refers to how we protect and control our personal information when we use the internet and digital services. It involves ensuring that our data is not misused, shared without our consent, or accessed by unauthorized parties. Think of it as locking your digital doors to keep your private information safe! 🔒🌐 PITCH DECK 2
  • 3. 3 Data privacy has a rich history, shaped by technological advancements, societal changes, and legal developments. Here are some key milestones: 1.Privacy as a Fundamental Right: The concept of privacy emerged in the late 19th century. Warren and Brandeis, in their influential 1890 article, argued that individuals have a right to be left alone and control their personal information. 2.Computerization and Digital Age: The advent of computers and digital data storage in the mid-20th century intensified privacy concerns. Organizations collect and process vast amounts of personal data without explicit consent. 3.Fair Information Practices (FIPs): In the 1970s, the U.S. Department of Health, Education, and Welfare proposed FIPs, emphasizing principles like notice, consent, and data minimization. These principles laid the groundwork for modern privacy frameworks.
  • 4. 1.Proliferation of Data Breaches: 1. As technology advances, so do cyber threats. Data breaches expose sensitive information, affecting individuals and organizations alike. 2. Cybercriminals exploit vulnerabilities, leading to leaks of personal data, financial records, and intellectual property. 2.Tracking and Profiling by Companies: 1. Companies collect vast amounts of user data for targeted advertising, personalization, and analytics. 2. While this enhances user experience, it raises concerns about privacy, consent, and the potential misuse of personal information. 3.Risks of Surveillance and Government Intrusion: 1. Surveillance technologies, both public and private, monitor our digital lives. Governments use them for security, but they can infringe on civil liberties. 2. Balancing security with privacy rights remains a delicate challenge. In this interconnected world, safeguarding privacy requires a delicate dance between innovation and protection. PITCH DECK 4
  • 5. 1. Encryption is the process of converting plaintext data into a secure, unreadable format (ciphertext) using cryptographic algorithms. 2. Purpose: 1. Confidentiality: Encrypting data ensures that only authorized parties can decipher and access it. 2. Integrity: It prevents unauthorized modifications during data transmission or storage. 3. Examples: 1. Symmetric Encryption: Uses a single secret key for both encryption and decryption (e.g., AES). 2. Asymmetric Encryption: Involves a key pair (public and private keys) for secure communication (e.g., RSA). 1.Anonymization: 1. Definition: Anonymization removes or alters personally identifiable information (PII) from datasets to protect privacy. 2. Purpose: 1. Privacy Compliance: Helps organizations comply with regulations (e.g., GDPR) by minimizing the risk of re-identification. 2. Data Sharing: Enables sharing of aggregated or masked data for research or analytics. 3. Techniques: 1. Pseudonymization: Replaces identifiable data with pseudonyms (e.g., replacing names with unique codes). 2. Generalization: Aggregates data (e.g., age ranges instead of exact ages). 3. Randomization: Introduces noise or randomness to prevent re-identification. 2.Secure Data Transfer Protocols: 1. Definition: These protocols ensure data integrity and confidentiality during transmission. 2. Examples: 1. HTTPS (Hypertext Transfer Protocol Secure): Encrypts data exchanged between a user’s browser and a web server. 2. SFTP (Secure File Transfer Protocol): Provides secure file transfers over SSH. 3. TLS/SSL (Transport Layer Security/Secure Sockets Layer): Encrypts data for secure communication over networks. Remember, implementing these technologies is crucial for safeguarding sensitive information in our interconnected world. . PITCH DECK 5
  • 6. PITCH DECK 6 1. AI and IoT advancements pose challenges to data privacy as they increase data collection and processing capabilities, requiring robust safeguards. 2. Future data privacy laws may focus on regulating algorithmic decision-making and ensuring transparency in automated systems. 3. Increased emphasis on user consent and data transparency may shape future regulations to empower individuals in controlling their personal information. 4. Stricter enforcement mechanisms and higher penalties could be implemented to deter data privacy violations in an increasingly digitized world. 5. Collaborative efforts between governments, tech companies, and advocacy groups may drive the development of standardized privacy frameworks to address evolving technological landscapes.
  • 9. PITCH DECK 9 This happens when data is transmitted from your organization to an external recipient without authorization APPS: . . . . And many more……
  • 10. PITCH DECK 10 . Have I Been Pwned: Check if your email has been compromised in a data breach EXPOSED https://www.exposed.lol/ Mine - The Future of Data Ownership (saymine.com) https://www.saymine.com/
  • 11. PITCH DECK 11 Name: P Afrid Khan (2023002100)