YoVDO

Mitigating Risk While Complying With Data Retention Laws

Offered By: Association for Computing Machinery (ACM) via YouTube

Tags

Data Retention Courses

Course Description

Overview

Explore a 20-minute conference talk that delves into the challenges of protecting data subject to mandatory retention laws while mitigating the risks of data breaches. Unpack the complexities of the title, examine "obvious" solutions and their shortcomings, and analyze adversarial cases. Discover the innovative Dragchute Escrow approach, including its high-level concept, encryption methods, and the process of creating time windows for data access. Learn about unlocking data, enabling proofs of compliance, and the intricacies of locking and attesting. Compare lock performance to gain insights into the effectiveness of this approach in balancing data protection and legal compliance.

Syllabus

Intro
Unpacking the Title
"Obvious" Solutions
Adversarial Cases
Dragchute Escrow - High Level
How the Encryption Happens
Lock - Creating the Time Window
Unlocking Data
Enabling Proofs of Compliance
Locking and Attesting
Lock Performance Comparison


Taught by

Association for Computing Machinery (ACM)

Related Courses

Protecting Health Data in the Modern Age: Getting to Grips with the GDPR
University of Groningen via FutureLearn
Managing G Suite
Google Cloud via Coursera
The European Charter of Fundamental Rights and Data Protection in the European legal framework
Global Campus of Human Rights via Independent
Information Classification
Pluralsight
Microsoft Azure Developer: Develop Solutions with Blob Storage
Pluralsight