O'Reilly logo

Privacy What Developers and IT Professionals Should Know by J. C. Cannon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Level 0 Application Decomposition

In a level 0 AD diagram, you should be able see the underlying data structures for a component. As you can see in Figure 11.4, the CRM application interacts with the registry, system log file, audit log file, History file, and customer database. The numeric identifiers for these data stores can be used in the privacy specification as a tracking mechanism to ensure that each data store is accounted for and as a reference for those who want to see where a data store fits into the AD.

Other members of your team should review this diagram to ensure that each data store and dataflow is accounted for. Because this diagram will play a major role in the privacy analysis you will be performing, it should be as accurate ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required