protection

NEWS

Introduction to GDPR

Our digital world depends on who we are and what we share whether posting to social media, shopping online, or engaging a government service. Information about us as citizens or consumers range from our identity to hihgly-sensitive information about our identity, health, finances, and opinions. As social media and organizations ...

Read more

Introduction to GDPR

Our digital world depends on who we are and what we share whether posting to social media, shopping online, or engaging a government service. Information about us as citizens or consumers range from our identity to hihgly-sensitive information about our identity, health, finances, and opinions. As social media and organizations collect more personal data and the inevitable attacks by malefactors on these systems, we need to define rules on how organizations should protect this information ...

Read more

Introduction to GDPR


Information Communication Technology for Humanitarian Responses

The humanitarian response to the Ebola outbreak in West Africa relied heavily on IT tools for support. This presentation will broadly cover humanitarian use cases, inherent challenges, and some examples of the technologies that have been used during the emergency response.

Read more

Information Communication Technology for Humanitarian Responses

The humanitarian response to the Ebola outbreak in West Africa relied heavily on IT tools for support. This presentation will broadly cover humanitarian use cases, inherent challenges, and some examples of the technologies that have been used during the emergency response.

Read more

Information Communication Technology for Humanitarian Responses

Categories


Tags