From the course: Ethical Data Collection for AI Implementation

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Implementing data protection measures

Implementing data protection measures

- Let's now turn our attention from discussing theory to practical implementations. Protecting sensitive data is one of the first major tests for any data collection system. This practice started in the 1960s when digital passwords were invented. Over the decades, keeping data safe and away from bad actors has become an essential part of business operations. Why? Well, it takes an average of 194 days to identify a data breach and can take 28 days less when sufficient countermeasures are maintained. So let's walk through three common data protection countermeasures. Each approach works as a piece of the puzzle to ward off potential invaders. We'll begin with the most well known and well-used security methods. Requiring login credentials. Known in tech circles as access control, these measures regulate who and what can be viewed, used, and modified within the computing system. Identification comes first. That's…

Contents