{"id":29800,"date":"2025-09-29T13:27:28","date_gmt":"2025-09-29T10:27:28","guid":{"rendered":"https:\/\/bti.stu.edu.iq\/?p=29800"},"modified":"2025-10-09T08:31:59","modified_gmt":"2025-10-09T05:31:59","slug":"a-training-workshop-on-the-backup-of-sensitive-data","status":"publish","type":"post","link":"https:\/\/bti.stu.edu.iq\/en\/29800\/","title":{"rendered":"A Training Workshop on the Backup of Sensitive Data"},"content":{"rendered":"<div class=\"xdj266r x14z9mp xat24cr x1lziwak x1vvkbs x126k92a\"><\/div>\n<div class=\"x14z9mp xat24cr x1lziwak x1vvkbs xtlvy1s x126k92a\">\n<div dir=\"auto\">\n<p data-start=\"400\" data-end=\"600\">The workshop was delivered by Ms. Shafaq Qasim Radi, Head of the Computer Division. She explained the main types of data backup, common methods, and key challenges in protecting sensitive information.<\/p>\n<p data-start=\"602\" data-end=\"863\">The event was attended by Mr. Murtadha Mohammed Bandar, Assistant Dean for Administrative and Financial Affairs, along with a number of staff members. Participants engaged with the workshop topics and emphasized the importance of data security in the workplace.<\/p>\n<\/div>\n<div dir=\"auto\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-medium wp-image-29736\" src=\"https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2025\/09\/550128239_804744098740307_4749615795236831932_n-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2025\/09\/550128239_804744098740307_4749615795236831932_n-300x200.jpg 300w, https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2025\/09\/550128239_804744098740307_4749615795236831932_n-768x512.jpg 768w, https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2025\/09\/550128239_804744098740307_4749615795236831932_n-100x67.jpg 100w, https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2025\/09\/550128239_804744098740307_4749615795236831932_n-1536x1025.jpg 1536w, https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2025\/09\/550128239_804744098740307_4749615795236831932_n.jpg 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/> <img decoding=\"async\" class=\"alignnone size-medium wp-image-29738\" src=\"https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2025\/09\/550182867_804744135406970_3449431111863907119_n-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2025\/09\/550182867_804744135406970_3449431111863907119_n-300x200.jpg 300w, https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2025\/09\/550182867_804744135406970_3449431111863907119_n-768x512.jpg 768w, https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2025\/09\/550182867_804744135406970_3449431111863907119_n-100x67.jpg 100w, https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2025\/09\/550182867_804744135406970_3449431111863907119_n-1536x1025.jpg 1536w, https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2025\/09\/550182867_804744135406970_3449431111863907119_n.jpg 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/> <img decoding=\"async\" class=\"alignnone size-medium wp-image-29740\" src=\"https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2025\/09\/552880621_804744128740304_6763366761197054881_n-1-300x198.jpg\" alt=\"\" width=\"300\" height=\"198\" srcset=\"https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2025\/09\/552880621_804744128740304_6763366761197054881_n-1-300x198.jpg 300w, https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2025\/09\/552880621_804744128740304_6763366761197054881_n-1-768x507.jpg 768w, https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2025\/09\/552880621_804744128740304_6763366761197054881_n-1-100x66.jpg 100w, https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2025\/09\/552880621_804744128740304_6763366761197054881_n-1-1536x1014.jpg 1536w, https:\/\/bti.stu.edu.iq\/wp-content\/uploads\/2025\/09\/552880621_804744128740304_6763366761197054881_n-1.jpg 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The workshop was delivered by Ms. Shafaq Qasim Radi, Head of the Computer Division. She explained the main types of data backup, common methods, and key challenges in protecting sensitive information. The event was attended by Mr. Murtadha Mohammed Bandar, Assistant Dean for Administrative and [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":29735,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[101],"tags":[],"table_tags":[],"class_list":["post-29800","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-scientific-activities"],"_links":{"self":[{"href":"https:\/\/bti.stu.edu.iq\/en\/wp-json\/wp\/v2\/posts\/29800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bti.stu.edu.iq\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bti.stu.edu.iq\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bti.stu.edu.iq\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/bti.stu.edu.iq\/en\/wp-json\/wp\/v2\/comments?post=29800"}],"version-history":[{"count":2,"href":"https:\/\/bti.stu.edu.iq\/en\/wp-json\/wp\/v2\/posts\/29800\/revisions"}],"predecessor-version":[{"id":29969,"href":"https:\/\/bti.stu.edu.iq\/en\/wp-json\/wp\/v2\/posts\/29800\/revisions\/29969"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bti.stu.edu.iq\/en\/wp-json\/wp\/v2\/media\/29735"}],"wp:attachment":[{"href":"https:\/\/bti.stu.edu.iq\/en\/wp-json\/wp\/v2\/media?parent=29800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bti.stu.edu.iq\/en\/wp-json\/wp\/v2\/categories?post=29800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bti.stu.edu.iq\/en\/wp-json\/wp\/v2\/tags?post=29800"},{"taxonomy":"table_tags","embeddable":true,"href":"https:\/\/bti.stu.edu.iq\/en\/wp-json\/wp\/v2\/table_tags?post=29800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}