JavaScript required
We’re sorry, but Coda doesn’t work properly without JavaScript enabled.
Skip to content
Gallery
NPA Cyber Security Contents
Data Security
Ethical Hacking
Digital Forensics
formative assessment
More
Share
Explore
Data Security
Click on any section to expand the contents
BM
Brendan McCart
outcomes
Personal Data
Personal Data
Key Ideas
Level
outcome
worksheet
Key Ideas
Level
outcome
worksheet
1
What is data
4
5
6
2
How is data collected
4
5
6
3
Where is data stored
4
5
6
4
How is personal data used and shared
4
5
6
5
What is personal Data
4
5
6
6
Two types of personal data
4
5
6
There are no rows in this table
Legal requirements
Legal requirements
Ethical use of data
Ethical use of data
Organisations and Data
Organisations and Data
Security personnel
Security personnel
Organisations: best practice
Organisations: best practice
security measures
security measures
cyber resilience
cyber resilience
risk management
risk management
encryption
encryption
data breach
data breach
security strategies
security strategies
Personal Data
Legal requirements
Ethical use of data
Organisations and Data
Security personnel
Organisations: best practice
security measures
cyber resilience
risk management
encryption
data breach
security strategies
Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
Ctrl
P
) instead.