3
Data Protection
In the previous chapter, we were talking about how to build our framework according to our needs, by using one or more frameworks; even better, at a certain point, we got the assumption that we could get the best of both worlds, or several, since we can, in fact, even use four or five different frameworks. What is fundamental, at the end of the day, is that you implement a Fort Knox-like infrastructure.
Specifically, in the following pages, we will try to understand some data protection-related topics, some of them beginning with a question mark, such as, for instance, What is privacy (and why do we desperately need it)? Then, we can try to get an idea of the reason why the word privacy is such an important part of our lives ...
Get Cybersecurity and Privacy Law Handbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.