Mitigating Risk While Complying With Data Retention Laws
Offered By: Association for Computing Machinery (ACM) via YouTube
Course Description
Overview
Explore a 20-minute conference talk that delves into the challenges of protecting data subject to mandatory retention laws while mitigating the risks of data breaches. Unpack the complexities of the title, examine "obvious" solutions and their shortcomings, and analyze adversarial cases. Discover the innovative Dragchute Escrow approach, including its high-level concept, encryption methods, and the process of creating time windows for data access. Learn about unlocking data, enabling proofs of compliance, and the intricacies of locking and attesting. Compare lock performance to gain insights into the effectiveness of this approach in balancing data protection and legal compliance.
Syllabus
Intro
Unpacking the Title
"Obvious" Solutions
Adversarial Cases
Dragchute Escrow - High Level
How the Encryption Happens
Lock - Creating the Time Window
Unlocking Data
Enabling Proofs of Compliance
Locking and Attesting
Lock Performance Comparison
Taught by
Association for Computing Machinery (ACM)
Related Courses
Protecting Health Data in the Modern Age: Getting to Grips with the GDPRUniversity of Groningen via FutureLearn Managing G Suite
Google Cloud via Coursera The European Charter of Fundamental Rights and Data Protection in the European legal framework
Global Campus of Human Rights via Independent Information Classification
Pluralsight Microsoft Azure Developer: Develop Solutions with Blob Storage
Pluralsight