Web Unleashed 2021

2021-10-20 00:00:00 2021-10-23 00:00:00 America/Toronto Web Unleashed 2021 Drive your career to the forefront by learning the latest tools, techniques and technologies in front-end web development. Online FITC EDT Online

Presentation


Overview

Online privacy has become an ever-present, high-priority topic in the last decade. This can be felt through new data retention and disclosure laws coming into effect, as well as numerous headlines in the media covering everything from data breaches to the ethics of big data used in AI applications. It’s never been more important to stay well-informed about user privacy as a software developer.

So where do you even start?

We’ll discuss the many facets and concerns of online privacy, how it relates to you both as a user and as a developer behind an online service, and what you need to know in order to protect the privacy of users in your day-to-day role of writing software. You’ll walk away with a new passion for how your software can protect rather than betray your fellow citizens.

Objective

Learn how to make the internet a much better place through protecting your fellow citizens’ online privacy.

Five Things Audience Members Will Learn

  1. Why user privacy matters
  2. How privacy is relevant to online services
  3. An exploration of morality (what “should” we do?) vs. the law (what “must” we do?) when it comes to online privacy
  4. Helpful guidelines to follow to protect the privacy of your users when writing code and designing systems
  5. Resources for technical up-skilling of user privacy and security matters

Target Audience

Web developers of all experience levels, both on the backend and frontend, who want to help protect the online privacy rights of citizens worldwide.

Assumed Audience Knowledge

Viewers would benefit from having a foundational understanding of databases, big data, cookies, and other tracking methods. It is also recommended that they have basic understanding of data security concepts such as encryption, authentication, and other defensive coding methods.