Parent directory/ | - | - |
A Backdoor by Any Other Name, and How to Stop It.mp4 | 14.5 MiB | 2022 Sep 15 11:38 |
A Backdoor by Any Other Name, and How to Stop It.srt | 32.8 KiB | 2022 Sep 13 03:26 |
A Differentially Private Data Analytics API at Scale.mp4 | 19.7 MiB | 2022 Sep 15 11:38 |
A Differentially Private Data Analytics API at Scale.srt | 39.8 KiB | 2022 Sep 13 03:19 |
Assessing Privacy Risk with the IPA Triad.mp4 | 13.0 MiB | 2022 Sep 15 11:38 |
Assessing Privacy Risk with the IPA Triad.srt | 38.2 KiB | 2022 Sep 13 03:28 |
Beyond Access Using Abac Frameworks to Implement Privacy and Security Policies.mp4 | 16.5 MiB | 2022 Sep 15 11:38 |
Beyond Access Using Abac Frameworks to Implement Privacy and Security Policies.srt | 34.1 KiB | 2022 Sep 13 03:18 |
Beyond the Individual Exploring Data Protection by Design in Connected Communal Spaces.mp4 | 18.2 MiB | 2022 Sep 15 11:38 |
Beyond the Individual Exploring Data Protection by Design in Connected Communal Spaces.srt | 30.3 KiB | 2022 Sep 13 03:22 |
Building an Effective Feedback Loop for Your Privacy Program through Privacy Incident.mp4 | 6.9 MiB | 2022 Sep 15 11:38 |
Building an Effective Feedback Loop for Your Privacy Program through Privacy Incident.srt | 24.7 KiB | 2022 Sep 13 03:26 |
Building and Deploying a Privacy Preserving Data Analysis Platform.mp4 | 15.8 MiB | 2022 Sep 15 11:38 |
Building and Deploying a Privacy Preserving Data Analysis Platform.srt | 45.2 KiB | 2022 Sep 13 03:19 |
Design of a Privacy Infrastructure for the Internet of Things.mp4 | 19.2 MiB | 2022 Sep 15 11:38 |
Design of a Privacy Infrastructure for the Internet of Things.srt | 43.2 KiB | 2022 Sep 13 03:26 |
Engineering Ethics into the NIST Privacy Framework.mp4 | 16.7 MiB | 2022 Sep 15 11:38 |
Engineering Ethics into the NIST Privacy Framework.srt | 33.0 KiB | 2022 Sep 13 03:28 |
How to (In)Effectively Convey Privacy Choices with Icons and Link Text.mp4 | 17.3 MiB | 2022 Sep 15 11:38 |
How to (In)Effectively Convey Privacy Choices with Icons and Link Text.srt | 42.2 KiB | 2022 Sep 13 03:21 |
Improving Usability of Differential Privacy at Scale.mp4 | 16.5 MiB | 2022 Sep 15 11:38 |
Improving Usability of Differential Privacy at Scale.srt | 37.3 KiB | 2022 Sep 13 03:19 |
Privacy Architecture for Data-Driven Innovation Configure.mp4 | 14.0 MiB | 2022 Sep 15 11:38 |
Privacy Architecture for Data-Driven Innovation Configure.srt | 43.8 KiB | 2022 Sep 13 03:18 |
Privacy Professional Boss Mode.mp4 | 11.9 MiB | 2022 Sep 15 11:38 |
Privacy Professional Boss Mode.srt | 27.5 KiB | 2022 Sep 13 03:24 |
Privacy in Deployment.mp4 | 20.1 MiB | 2022 Sep 15 11:38 |
Privacy in Deployment.srt | 38.2 KiB | 2022 Sep 13 03:25 |
Product Privacy Journey Towards a Product Centric Privacy Engineering Framework.mp4 | 10.3 MiB | 2022 Sep 15 11:38 |
Product Privacy Journey Towards a Product Centric Privacy Engineering Framework.srt | 30.4 KiB | 2022 Sep 13 03:23 |
Responsible Design through Experimentation Learnings from LinkedIn.mp4 | 16.4 MiB | 2022 Sep 15 11:38 |
Responsible Design through Experimentation Learnings from LinkedIn.srt | 50.9 KiB | 2022 Sep 13 03:18 |
Taking Responsibility for Someone Else's Code Studying the Privacy Behaviors of Mobile.mp4 | 15.2 MiB | 2022 Sep 15 11:38 |
Taking Responsibility for Someone Else's Code Studying the Privacy Behaviors of Mobile.srt | 47.5 KiB | 2022 Sep 13 03:27 |
Throwing Out the Checklist.mp4 | 5.9 MiB | 2022 Sep 15 11:38 |
Throwing Out the Checklist.srt | 18.0 KiB | 2022 Sep 13 03:23 |
When Engineers and Lawyers Talk Right-Sizing Your Data Protection Risk Profile.mp4 | 10.9 MiB | 2022 Sep 15 11:38 |
When Engineers and Lawyers Talk Right-Sizing Your Data Protection Risk Profile.srt | 32.7 KiB | 2022 Sep 13 03:29 |
When Things Go Wrong.mp4 | 14.1 MiB | 2022 Sep 15 11:38 |
When Things Go Wrong.srt | 43.6 KiB | 2022 Sep 13 03:27 |
Wikipedia and the Lean Data Diet.mp4 | 16.6 MiB | 2022 Sep 15 11:38 |
Wikipedia and the Lean Data Diet.srt | 38.0 KiB | 2022 Sep 13 03:24 |