SlideShare une entreprise Scribd logo
1  sur  11
.
P. Afrid khan
(2023002100)
• The data privacy in the
digital age refers to how we
protect and control our
personal information when
we use the internet and
digital services. It involves
ensuring that our data is not
misused, shared without our
consent, or accessed by
unauthorized parties. Think
of it as locking your digital
doors to keep your private
information safe! 🔒🌐
PITCH DECK 2
3
Data privacy has a rich history, shaped by technological advancements, societal
changes, and legal developments. Here are some key milestones:
1.Privacy as a Fundamental Right: The concept of privacy emerged in the late
19th century. Warren and Brandeis, in their influential 1890 article, argued that
individuals have a right to be left alone and control their personal information.
2.Computerization and Digital Age: The advent of computers and digital data
storage in the mid-20th century intensified privacy concerns. Organizations
collect and process vast amounts of personal data without explicit consent.
3.Fair Information Practices (FIPs): In the 1970s, the U.S. Department of
Health, Education, and Welfare proposed FIPs, emphasizing principles like
notice, consent, and data minimization. These principles laid the groundwork for
modern privacy frameworks.
1.Proliferation of Data Breaches:
1. As technology advances, so do cyber threats. Data breaches expose sensitive information, affecting individuals and
organizations alike.
2. Cybercriminals exploit vulnerabilities, leading to leaks of personal data, financial records, and intellectual property.
2.Tracking and Profiling by Companies:
1. Companies collect vast amounts of user data for targeted advertising, personalization, and analytics.
2. While this enhances user experience, it raises concerns about privacy, consent, and the potential misuse of personal
information.
3.Risks of Surveillance and Government Intrusion:
1. Surveillance technologies, both public and private, monitor our digital lives. Governments use them for security, but they
can infringe on civil liberties.
2. Balancing security with privacy rights remains a delicate challenge.
In this interconnected world, safeguarding privacy requires a delicate dance between innovation and protection.
PITCH DECK 4
1. Encryption is the process of converting plaintext data into a secure, unreadable format (ciphertext) using cryptographic algorithms.
2. Purpose:
1. Confidentiality: Encrypting data ensures that only authorized parties can decipher and access it.
2. Integrity: It prevents unauthorized modifications during data transmission or storage.
3. Examples:
1. Symmetric Encryption: Uses a single secret key for both encryption and decryption (e.g., AES).
2. Asymmetric Encryption: Involves a key pair (public and private keys) for secure communication (e.g., RSA).
1.Anonymization:
1. Definition: Anonymization removes or alters personally identifiable information (PII) from datasets to protect privacy.
2. Purpose:
1. Privacy Compliance: Helps organizations comply with regulations (e.g., GDPR) by minimizing the risk of re-identification.
2. Data Sharing: Enables sharing of aggregated or masked data for research or analytics.
3. Techniques:
1. Pseudonymization: Replaces identifiable data with pseudonyms (e.g., replacing names with unique codes).
2. Generalization: Aggregates data (e.g., age ranges instead of exact ages).
3. Randomization: Introduces noise or randomness to prevent re-identification.
2.Secure Data Transfer Protocols:
1. Definition: These protocols ensure data integrity and confidentiality during transmission.
2. Examples:
1. HTTPS (Hypertext Transfer Protocol Secure): Encrypts data exchanged between a user’s browser and a web server.
2. SFTP (Secure File Transfer Protocol): Provides secure file transfers over SSH.
3. TLS/SSL (Transport Layer Security/Secure Sockets Layer): Encrypts data for secure communication over networks.
Remember, implementing these technologies is crucial for safeguarding sensitive information in our interconnected world.
.
PITCH DECK 5
PITCH DECK 6
1. AI and IoT advancements pose challenges to data privacy as they increase data
collection and processing capabilities, requiring robust safeguards.
2. Future data privacy laws may focus on regulating algorithmic decision-making and
ensuring transparency in automated systems.
3. Increased emphasis on user consent and data transparency may shape future
regulations to empower individuals in controlling their personal information.
4. Stricter enforcement mechanisms and higher penalties could be implemented to
deter data privacy violations in an increasingly digitized world.
5. Collaborative efforts between governments, tech companies, and advocacy groups
may drive the development of standardized privacy frameworks to address evolving
technological landscapes.
.
.
.
.
.
.
.
.
PITCH DECK 7
.
.
.
.
.
.
.
.
PITCH DECK 8
PITCH DECK 9
This happens when data is transmitted from your organization to an
external recipient without authorization
APPS:
.
.
.
.
And many more……
PITCH DECK 10
.
Have I Been Pwned: Check if your email has been compromised in a data breach
EXPOSED https://www.exposed.lol/
Mine - The Future of Data Ownership (saymine.com)
https://www.saymine.com/
PITCH DECK 11
Name: P Afrid
Khan
(2023002100)

Contenu connexe

Similaire à data privacy in digital technology .pptx

Inria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case StudyEvelyn Donaldson
 
survey project-1
survey project-1survey project-1
survey project-1NAVIT GAUR
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfyashapnt
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information SecurityCharles Mok
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesTam Nguyen
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet ReportAhmed Mater
 
Data Protection and Privacy laws class 11
Data Protection and Privacy laws class 11Data Protection and Privacy laws class 11
Data Protection and Privacy laws class 11mufalegend
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber securityzaarahary
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodblogzilla
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 

Similaire à data privacy in digital technology .pptx (16)

Inria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directions
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case Study
 
survey project-1
survey project-1survey project-1
survey project-1
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdf
 
Chapter 1 - Introduction.pdf
Chapter 1 - Introduction.pdfChapter 1 - Introduction.pdf
Chapter 1 - Introduction.pdf
 
A01450131
A01450131A01450131
A01450131
 
DATA SOVEREIGHTY IGF.pptx
DATA SOVEREIGHTY IGF.pptxDATA SOVEREIGHTY IGF.pptx
DATA SOVEREIGHTY IGF.pptx
 
encryption.pptx
encryption.pptxencryption.pptx
encryption.pptx
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
 
Data Protection and Privacy laws class 11
Data Protection and Privacy laws class 11Data Protection and Privacy laws class 11
Data Protection and Privacy laws class 11
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 

Dernier

如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证ju0dztxtn
 
How to Transform Clinical Trial Management with Advanced Data Analytics
How to Transform Clinical Trial Management with Advanced Data AnalyticsHow to Transform Clinical Trial Management with Advanced Data Analytics
How to Transform Clinical Trial Management with Advanced Data AnalyticsBrainSell Technologies
 
Sensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
Sensing the Future: Anomaly Detection and Event Prediction in Sensor NetworksSensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
Sensing the Future: Anomaly Detection and Event Prediction in Sensor NetworksBoston Institute of Analytics
 
1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证
1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证
1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证ppy8zfkfm
 
What is Insertion Sort. Its basic information
What is Insertion Sort. Its basic informationWhat is Insertion Sort. Its basic information
What is Insertion Sort. Its basic informationmuqadasqasim10
 
一比一原版纽卡斯尔大学毕业证成绩单如何办理
一比一原版纽卡斯尔大学毕业证成绩单如何办理一比一原版纽卡斯尔大学毕业证成绩单如何办理
一比一原版纽卡斯尔大学毕业证成绩单如何办理cyebo
 
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...Amil baba
 
Audience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptxAudience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptxStephen266013
 
一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理pyhepag
 
The Significance of Transliteration Enhancing
The Significance of Transliteration EnhancingThe Significance of Transliteration Enhancing
The Significance of Transliteration Enhancingmohamed Elzalabany
 
Seven tools of quality control.slideshare
Seven tools of quality control.slideshareSeven tools of quality control.slideshare
Seven tools of quality control.slideshareraiaryan448
 
Atlantic Grupa Case Study (Mintec Data AI)
Atlantic Grupa Case Study (Mintec Data AI)Atlantic Grupa Case Study (Mintec Data AI)
Atlantic Grupa Case Study (Mintec Data AI)Jon Hansen
 
Abortion Clinic in Randfontein +27791653574 Randfontein WhatsApp Abortion Cli...
Abortion Clinic in Randfontein +27791653574 Randfontein WhatsApp Abortion Cli...Abortion Clinic in Randfontein +27791653574 Randfontein WhatsApp Abortion Cli...
Abortion Clinic in Randfontein +27791653574 Randfontein WhatsApp Abortion Cli...mikehavy0
 
Credit Card Fraud Detection: Safeguarding Transactions in the Digital Age
Credit Card Fraud Detection: Safeguarding Transactions in the Digital AgeCredit Card Fraud Detection: Safeguarding Transactions in the Digital Age
Credit Card Fraud Detection: Safeguarding Transactions in the Digital AgeBoston Institute of Analytics
 
社内勉強会資料  Mamba - A new era or ephemeral
社内勉強会資料   Mamba - A new era or ephemeral社内勉強会資料   Mamba - A new era or ephemeral
社内勉強会資料  Mamba - A new era or ephemeralNABLAS株式会社
 
MATERI MANAJEMEN OF PENYAKIT TETANUS.ppt
MATERI  MANAJEMEN OF PENYAKIT TETANUS.pptMATERI  MANAJEMEN OF PENYAKIT TETANUS.ppt
MATERI MANAJEMEN OF PENYAKIT TETANUS.pptRachmaGhifari
 
Northern New England Tableau User Group (TUG) May 2024
Northern New England Tableau User Group (TUG) May 2024Northern New England Tableau User Group (TUG) May 2024
Northern New England Tableau User Group (TUG) May 2024patrickdtherriault
 
Formulas dax para power bI de microsoft.pdf
Formulas dax para power bI de microsoft.pdfFormulas dax para power bI de microsoft.pdf
Formulas dax para power bI de microsoft.pdfRobertoOcampo24
 
一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理
一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理
一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理pyhepag
 
一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理pyhepag
 

Dernier (20)

如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
 
How to Transform Clinical Trial Management with Advanced Data Analytics
How to Transform Clinical Trial Management with Advanced Data AnalyticsHow to Transform Clinical Trial Management with Advanced Data Analytics
How to Transform Clinical Trial Management with Advanced Data Analytics
 
Sensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
Sensing the Future: Anomaly Detection and Event Prediction in Sensor NetworksSensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
Sensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
 
1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证
1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证
1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证
 
What is Insertion Sort. Its basic information
What is Insertion Sort. Its basic informationWhat is Insertion Sort. Its basic information
What is Insertion Sort. Its basic information
 
一比一原版纽卡斯尔大学毕业证成绩单如何办理
一比一原版纽卡斯尔大学毕业证成绩单如何办理一比一原版纽卡斯尔大学毕业证成绩单如何办理
一比一原版纽卡斯尔大学毕业证成绩单如何办理
 
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
 
Audience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptxAudience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptx
 
一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理
 
The Significance of Transliteration Enhancing
The Significance of Transliteration EnhancingThe Significance of Transliteration Enhancing
The Significance of Transliteration Enhancing
 
Seven tools of quality control.slideshare
Seven tools of quality control.slideshareSeven tools of quality control.slideshare
Seven tools of quality control.slideshare
 
Atlantic Grupa Case Study (Mintec Data AI)
Atlantic Grupa Case Study (Mintec Data AI)Atlantic Grupa Case Study (Mintec Data AI)
Atlantic Grupa Case Study (Mintec Data AI)
 
Abortion Clinic in Randfontein +27791653574 Randfontein WhatsApp Abortion Cli...
Abortion Clinic in Randfontein +27791653574 Randfontein WhatsApp Abortion Cli...Abortion Clinic in Randfontein +27791653574 Randfontein WhatsApp Abortion Cli...
Abortion Clinic in Randfontein +27791653574 Randfontein WhatsApp Abortion Cli...
 
Credit Card Fraud Detection: Safeguarding Transactions in the Digital Age
Credit Card Fraud Detection: Safeguarding Transactions in the Digital AgeCredit Card Fraud Detection: Safeguarding Transactions in the Digital Age
Credit Card Fraud Detection: Safeguarding Transactions in the Digital Age
 
社内勉強会資料  Mamba - A new era or ephemeral
社内勉強会資料   Mamba - A new era or ephemeral社内勉強会資料   Mamba - A new era or ephemeral
社内勉強会資料  Mamba - A new era or ephemeral
 
MATERI MANAJEMEN OF PENYAKIT TETANUS.ppt
MATERI  MANAJEMEN OF PENYAKIT TETANUS.pptMATERI  MANAJEMEN OF PENYAKIT TETANUS.ppt
MATERI MANAJEMEN OF PENYAKIT TETANUS.ppt
 
Northern New England Tableau User Group (TUG) May 2024
Northern New England Tableau User Group (TUG) May 2024Northern New England Tableau User Group (TUG) May 2024
Northern New England Tableau User Group (TUG) May 2024
 
Formulas dax para power bI de microsoft.pdf
Formulas dax para power bI de microsoft.pdfFormulas dax para power bI de microsoft.pdf
Formulas dax para power bI de microsoft.pdf
 
一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理
一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理
一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理
 
一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理
 

data privacy in digital technology .pptx

  • 2. • The data privacy in the digital age refers to how we protect and control our personal information when we use the internet and digital services. It involves ensuring that our data is not misused, shared without our consent, or accessed by unauthorized parties. Think of it as locking your digital doors to keep your private information safe! 🔒🌐 PITCH DECK 2
  • 3. 3 Data privacy has a rich history, shaped by technological advancements, societal changes, and legal developments. Here are some key milestones: 1.Privacy as a Fundamental Right: The concept of privacy emerged in the late 19th century. Warren and Brandeis, in their influential 1890 article, argued that individuals have a right to be left alone and control their personal information. 2.Computerization and Digital Age: The advent of computers and digital data storage in the mid-20th century intensified privacy concerns. Organizations collect and process vast amounts of personal data without explicit consent. 3.Fair Information Practices (FIPs): In the 1970s, the U.S. Department of Health, Education, and Welfare proposed FIPs, emphasizing principles like notice, consent, and data minimization. These principles laid the groundwork for modern privacy frameworks.
  • 4. 1.Proliferation of Data Breaches: 1. As technology advances, so do cyber threats. Data breaches expose sensitive information, affecting individuals and organizations alike. 2. Cybercriminals exploit vulnerabilities, leading to leaks of personal data, financial records, and intellectual property. 2.Tracking and Profiling by Companies: 1. Companies collect vast amounts of user data for targeted advertising, personalization, and analytics. 2. While this enhances user experience, it raises concerns about privacy, consent, and the potential misuse of personal information. 3.Risks of Surveillance and Government Intrusion: 1. Surveillance technologies, both public and private, monitor our digital lives. Governments use them for security, but they can infringe on civil liberties. 2. Balancing security with privacy rights remains a delicate challenge. In this interconnected world, safeguarding privacy requires a delicate dance between innovation and protection. PITCH DECK 4
  • 5. 1. Encryption is the process of converting plaintext data into a secure, unreadable format (ciphertext) using cryptographic algorithms. 2. Purpose: 1. Confidentiality: Encrypting data ensures that only authorized parties can decipher and access it. 2. Integrity: It prevents unauthorized modifications during data transmission or storage. 3. Examples: 1. Symmetric Encryption: Uses a single secret key for both encryption and decryption (e.g., AES). 2. Asymmetric Encryption: Involves a key pair (public and private keys) for secure communication (e.g., RSA). 1.Anonymization: 1. Definition: Anonymization removes or alters personally identifiable information (PII) from datasets to protect privacy. 2. Purpose: 1. Privacy Compliance: Helps organizations comply with regulations (e.g., GDPR) by minimizing the risk of re-identification. 2. Data Sharing: Enables sharing of aggregated or masked data for research or analytics. 3. Techniques: 1. Pseudonymization: Replaces identifiable data with pseudonyms (e.g., replacing names with unique codes). 2. Generalization: Aggregates data (e.g., age ranges instead of exact ages). 3. Randomization: Introduces noise or randomness to prevent re-identification. 2.Secure Data Transfer Protocols: 1. Definition: These protocols ensure data integrity and confidentiality during transmission. 2. Examples: 1. HTTPS (Hypertext Transfer Protocol Secure): Encrypts data exchanged between a user’s browser and a web server. 2. SFTP (Secure File Transfer Protocol): Provides secure file transfers over SSH. 3. TLS/SSL (Transport Layer Security/Secure Sockets Layer): Encrypts data for secure communication over networks. Remember, implementing these technologies is crucial for safeguarding sensitive information in our interconnected world. . PITCH DECK 5
  • 6. PITCH DECK 6 1. AI and IoT advancements pose challenges to data privacy as they increase data collection and processing capabilities, requiring robust safeguards. 2. Future data privacy laws may focus on regulating algorithmic decision-making and ensuring transparency in automated systems. 3. Increased emphasis on user consent and data transparency may shape future regulations to empower individuals in controlling their personal information. 4. Stricter enforcement mechanisms and higher penalties could be implemented to deter data privacy violations in an increasingly digitized world. 5. Collaborative efforts between governments, tech companies, and advocacy groups may drive the development of standardized privacy frameworks to address evolving technological landscapes.
  • 9. PITCH DECK 9 This happens when data is transmitted from your organization to an external recipient without authorization APPS: . . . . And many more……
  • 10. PITCH DECK 10 . Have I Been Pwned: Check if your email has been compromised in a data breach EXPOSED https://www.exposed.lol/ Mine - The Future of Data Ownership (saymine.com) https://www.saymine.com/
  • 11. PITCH DECK 11 Name: P Afrid Khan (2023002100)