From the course: CompTIA Data+ (DA0-002) Cert Prep
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Data ethics
From the course: CompTIA Data+ (DA0-002) Cert Prep
Data ethics
- Data ethics is the practice of using data in ways that are fair, responsible, and aligned with societal expectations. Ethics goes beyond legal compliance and focuses on doing what is right when we're collecting, analyzing, sharing, and storing information. Ethical data practices help protect individuals from harm, build trust with stakeholders, and support the long-term credibility of data-driven systems. One of the core principles of data ethics is respect for individual privacy. Even when data use is legally permitted, organizations should consider whether that use aligns with what individuals would reasonably expect. For example, if users provide their information to receive a product or service, they might not expect that data to be used for unrelated advertising or shared with third parties without clear notice. Being transparent about how data is used is essential to ethical practice. Another ethical concern is bias in data and algorithms. If the data used to train a model…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Structured query language3m 41s
-
SELECT statement2m 27s
-
(Locked)
Sorting results4m 3s
-
(Locked)
Filtering data4m 1s
-
(Locked)
NULL values3m 26s
-
(Locked)
Aggregating data3m 8s
-
(Locked)
Grouping data3m 7s
-
(Locked)
String manipulation2m 43s
-
(Locked)
Working with dates2m 14s
-
(Locked)
Derived values3m 16s
-
(Locked)
Set operations5m 37s
-
(Locked)
Join operations1m 58s
-
(Locked)
Inner joins7m 7s
-
(Locked)
Joining multiple tables6m 34s
-
(Locked)
Outer joins2m 55s
-
(Locked)
Nested queries2m 17s
-
(Locked)
-
-
(Locked)
Line chart1m 32s
-
(Locked)
Scatterplots and bubble charts1m 48s
-
(Locked)
Pie charts1m 24s
-
(Locked)
Bar charts and histograms2m 33s
-
(Locked)
Waterfall charts1m 22s
-
(Locked)
Heat maps and geographic maps1m 54s
-
(Locked)
Tree maps1m 25s
-
(Locked)
Word clouds and infographics1m 18s
-
(Locked)
Pivot tables4m 54s
-
(Locked)
-
-
Today's regulatory landscape3m 35s
-
(Locked)
Health insurance portability and accountability act (HIPAA)4m 45s
-
(Locked)
Family educational rights and privacy act (FERPA)5m 25s
-
Gramm leach bliley act (GLBA)4m 10s
-
(Locked)
Data breach notification laws3m 19s
-
(Locked)
International data transfers3m 22s
-
-
-
(Locked)
Goals of information security2m 9s
-
(Locked)
Preserving data confidentiality2m 18s
-
(Locked)
Building an access management program3m 12s
-
(Locked)
Authentication, authorization, and accounting2m 58s
-
(Locked)
Managing the data lifecycle4m 43s
-
(Locked)
Data classification2m 41s
-
(Locked)
Control and risk frameworks8m 54s
-
(Locked)
Audits and assessments5m 52s
-
(Locked)