SlideShare a Scribd company logo
1 of 11
.
P. Afrid khan
(2023002100)
• The data privacy in the
digital age refers to how we
protect and control our
personal information when
we use the internet and
digital services. It involves
ensuring that our data is not
misused, shared without our
consent, or accessed by
unauthorized parties. Think
of it as locking your digital
doors to keep your private
information safe! 🔒🌐
PITCH DECK 2
3
Data privacy has a rich history, shaped by technological advancements, societal
changes, and legal developments. Here are some key milestones:
1.Privacy as a Fundamental Right: The concept of privacy emerged in the late
19th century. Warren and Brandeis, in their influential 1890 article, argued that
individuals have a right to be left alone and control their personal information.
2.Computerization and Digital Age: The advent of computers and digital data
storage in the mid-20th century intensified privacy concerns. Organizations
collect and process vast amounts of personal data without explicit consent.
3.Fair Information Practices (FIPs): In the 1970s, the U.S. Department of
Health, Education, and Welfare proposed FIPs, emphasizing principles like
notice, consent, and data minimization. These principles laid the groundwork for
modern privacy frameworks.
1.Proliferation of Data Breaches:
1. As technology advances, so do cyber threats. Data breaches expose sensitive information, affecting individuals and
organizations alike.
2. Cybercriminals exploit vulnerabilities, leading to leaks of personal data, financial records, and intellectual property.
2.Tracking and Profiling by Companies:
1. Companies collect vast amounts of user data for targeted advertising, personalization, and analytics.
2. While this enhances user experience, it raises concerns about privacy, consent, and the potential misuse of personal
information.
3.Risks of Surveillance and Government Intrusion:
1. Surveillance technologies, both public and private, monitor our digital lives. Governments use them for security, but they
can infringe on civil liberties.
2. Balancing security with privacy rights remains a delicate challenge.
In this interconnected world, safeguarding privacy requires a delicate dance between innovation and protection.
PITCH DECK 4
1. Encryption is the process of converting plaintext data into a secure, unreadable format (ciphertext) using cryptographic algorithms.
2. Purpose:
1. Confidentiality: Encrypting data ensures that only authorized parties can decipher and access it.
2. Integrity: It prevents unauthorized modifications during data transmission or storage.
3. Examples:
1. Symmetric Encryption: Uses a single secret key for both encryption and decryption (e.g., AES).
2. Asymmetric Encryption: Involves a key pair (public and private keys) for secure communication (e.g., RSA).
1.Anonymization:
1. Definition: Anonymization removes or alters personally identifiable information (PII) from datasets to protect privacy.
2. Purpose:
1. Privacy Compliance: Helps organizations comply with regulations (e.g., GDPR) by minimizing the risk of re-identification.
2. Data Sharing: Enables sharing of aggregated or masked data for research or analytics.
3. Techniques:
1. Pseudonymization: Replaces identifiable data with pseudonyms (e.g., replacing names with unique codes).
2. Generalization: Aggregates data (e.g., age ranges instead of exact ages).
3. Randomization: Introduces noise or randomness to prevent re-identification.
2.Secure Data Transfer Protocols:
1. Definition: These protocols ensure data integrity and confidentiality during transmission.
2. Examples:
1. HTTPS (Hypertext Transfer Protocol Secure): Encrypts data exchanged between a user’s browser and a web server.
2. SFTP (Secure File Transfer Protocol): Provides secure file transfers over SSH.
3. TLS/SSL (Transport Layer Security/Secure Sockets Layer): Encrypts data for secure communication over networks.
Remember, implementing these technologies is crucial for safeguarding sensitive information in our interconnected world.
.
PITCH DECK 5
PITCH DECK 6
1. AI and IoT advancements pose challenges to data privacy as they increase data
collection and processing capabilities, requiring robust safeguards.
2. Future data privacy laws may focus on regulating algorithmic decision-making and
ensuring transparency in automated systems.
3. Increased emphasis on user consent and data transparency may shape future
regulations to empower individuals in controlling their personal information.
4. Stricter enforcement mechanisms and higher penalties could be implemented to
deter data privacy violations in an increasingly digitized world.
5. Collaborative efforts between governments, tech companies, and advocacy groups
may drive the development of standardized privacy frameworks to address evolving
technological landscapes.
.
.
.
.
.
.
.
.
PITCH DECK 7
.
.
.
.
.
.
.
.
PITCH DECK 8
PITCH DECK 9
This happens when data is transmitted from your organization to an
external recipient without authorization
APPS:
.
.
.
.
And many more……
PITCH DECK 10
.
Have I Been Pwned: Check if your email has been compromised in a data breach
EXPOSED https://www.exposed.lol/
Mine - The Future of Data Ownership (saymine.com)
https://www.saymine.com/
PITCH DECK 11
Name: P Afrid
Khan
(2023002100)

More Related Content

Similar to data privacy in digital technology .pptx

Inria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case StudyEvelyn Donaldson
 
survey project-1
survey project-1survey project-1
survey project-1NAVIT GAUR
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfyashapnt
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information SecurityCharles Mok
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesTam Nguyen
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet ReportAhmed Mater
 
Data Protection and Privacy laws class 11
Data Protection and Privacy laws class 11Data Protection and Privacy laws class 11
Data Protection and Privacy laws class 11mufalegend
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber securityzaarahary
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodblogzilla
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 

Similar to data privacy in digital technology .pptx (16)

Inria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directions
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case Study
 
survey project-1
survey project-1survey project-1
survey project-1
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdf
 
Chapter 1 - Introduction.pdf
Chapter 1 - Introduction.pdfChapter 1 - Introduction.pdf
Chapter 1 - Introduction.pdf
 
A01450131
A01450131A01450131
A01450131
 
DATA SOVEREIGHTY IGF.pptx
DATA SOVEREIGHTY IGF.pptxDATA SOVEREIGHTY IGF.pptx
DATA SOVEREIGHTY IGF.pptx
 
encryption.pptx
encryption.pptxencryption.pptx
encryption.pptx
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
 
Data Protection and Privacy laws class 11
Data Protection and Privacy laws class 11Data Protection and Privacy laws class 11
Data Protection and Privacy laws class 11
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 

Recently uploaded

Digi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptxDigi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptxTanveerAhmed817946
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...shivangimorya083
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...Pooja Nehwal
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service LucknowAminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknowmakika9823
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 

Recently uploaded (20)

Decoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in ActionDecoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in Action
 
Digi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptxDigi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptx
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service LucknowAminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 

data privacy in digital technology .pptx

  • 2. • The data privacy in the digital age refers to how we protect and control our personal information when we use the internet and digital services. It involves ensuring that our data is not misused, shared without our consent, or accessed by unauthorized parties. Think of it as locking your digital doors to keep your private information safe! 🔒🌐 PITCH DECK 2
  • 3. 3 Data privacy has a rich history, shaped by technological advancements, societal changes, and legal developments. Here are some key milestones: 1.Privacy as a Fundamental Right: The concept of privacy emerged in the late 19th century. Warren and Brandeis, in their influential 1890 article, argued that individuals have a right to be left alone and control their personal information. 2.Computerization and Digital Age: The advent of computers and digital data storage in the mid-20th century intensified privacy concerns. Organizations collect and process vast amounts of personal data without explicit consent. 3.Fair Information Practices (FIPs): In the 1970s, the U.S. Department of Health, Education, and Welfare proposed FIPs, emphasizing principles like notice, consent, and data minimization. These principles laid the groundwork for modern privacy frameworks.
  • 4. 1.Proliferation of Data Breaches: 1. As technology advances, so do cyber threats. Data breaches expose sensitive information, affecting individuals and organizations alike. 2. Cybercriminals exploit vulnerabilities, leading to leaks of personal data, financial records, and intellectual property. 2.Tracking and Profiling by Companies: 1. Companies collect vast amounts of user data for targeted advertising, personalization, and analytics. 2. While this enhances user experience, it raises concerns about privacy, consent, and the potential misuse of personal information. 3.Risks of Surveillance and Government Intrusion: 1. Surveillance technologies, both public and private, monitor our digital lives. Governments use them for security, but they can infringe on civil liberties. 2. Balancing security with privacy rights remains a delicate challenge. In this interconnected world, safeguarding privacy requires a delicate dance between innovation and protection. PITCH DECK 4
  • 5. 1. Encryption is the process of converting plaintext data into a secure, unreadable format (ciphertext) using cryptographic algorithms. 2. Purpose: 1. Confidentiality: Encrypting data ensures that only authorized parties can decipher and access it. 2. Integrity: It prevents unauthorized modifications during data transmission or storage. 3. Examples: 1. Symmetric Encryption: Uses a single secret key for both encryption and decryption (e.g., AES). 2. Asymmetric Encryption: Involves a key pair (public and private keys) for secure communication (e.g., RSA). 1.Anonymization: 1. Definition: Anonymization removes or alters personally identifiable information (PII) from datasets to protect privacy. 2. Purpose: 1. Privacy Compliance: Helps organizations comply with regulations (e.g., GDPR) by minimizing the risk of re-identification. 2. Data Sharing: Enables sharing of aggregated or masked data for research or analytics. 3. Techniques: 1. Pseudonymization: Replaces identifiable data with pseudonyms (e.g., replacing names with unique codes). 2. Generalization: Aggregates data (e.g., age ranges instead of exact ages). 3. Randomization: Introduces noise or randomness to prevent re-identification. 2.Secure Data Transfer Protocols: 1. Definition: These protocols ensure data integrity and confidentiality during transmission. 2. Examples: 1. HTTPS (Hypertext Transfer Protocol Secure): Encrypts data exchanged between a user’s browser and a web server. 2. SFTP (Secure File Transfer Protocol): Provides secure file transfers over SSH. 3. TLS/SSL (Transport Layer Security/Secure Sockets Layer): Encrypts data for secure communication over networks. Remember, implementing these technologies is crucial for safeguarding sensitive information in our interconnected world. . PITCH DECK 5
  • 6. PITCH DECK 6 1. AI and IoT advancements pose challenges to data privacy as they increase data collection and processing capabilities, requiring robust safeguards. 2. Future data privacy laws may focus on regulating algorithmic decision-making and ensuring transparency in automated systems. 3. Increased emphasis on user consent and data transparency may shape future regulations to empower individuals in controlling their personal information. 4. Stricter enforcement mechanisms and higher penalties could be implemented to deter data privacy violations in an increasingly digitized world. 5. Collaborative efforts between governments, tech companies, and advocacy groups may drive the development of standardized privacy frameworks to address evolving technological landscapes.
  • 9. PITCH DECK 9 This happens when data is transmitted from your organization to an external recipient without authorization APPS: . . . . And many more……
  • 10. PITCH DECK 10 . Have I Been Pwned: Check if your email has been compromised in a data breach EXPOSED https://www.exposed.lol/ Mine - The Future of Data Ownership (saymine.com) https://www.saymine.com/
  • 11. PITCH DECK 11 Name: P Afrid Khan (2023002100)