Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Mitigating Risk While Complying With Data Retention Laws

Association for Computing Machinery (ACM) via YouTube

Overview

Explore a 20-minute conference talk that delves into the challenges of protecting data subject to mandatory retention laws while mitigating the risks of data breaches. Unpack the complexities of the title, examine "obvious" solutions and their shortcomings, and analyze adversarial cases. Discover the innovative Dragchute Escrow approach, including its high-level concept, encryption methods, and the process of creating time windows for data access. Learn about unlocking data, enabling proofs of compliance, and the intricacies of locking and attesting. Compare lock performance to gain insights into the effectiveness of this approach in balancing data protection and legal compliance.

Syllabus

Intro
Unpacking the Title
"Obvious" Solutions
Adversarial Cases
Dragchute Escrow - High Level
How the Encryption Happens
Lock - Creating the Time Window
Unlocking Data
Enabling Proofs of Compliance
Locking and Attesting
Lock Performance Comparison

Taught by

Association for Computing Machinery (ACM)

Reviews

Start your review of Mitigating Risk While Complying With Data Retention Laws

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.