O'Reilly logo

Privacy What Developers and IT Professionals Should Know by J. C. Cannon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Privacy Boundaries

To make it easier to perform and document a privacy analysis, privacy boundaries can be used to group parts of a DFD that exhibit the same types of privacy behavior and to indicate the area of control. A privacy boundary is characterized by a region drawn on a DFD that encapsulates selected processes and data stores. All data stores within the region must be accessed only by processes developed by the group performing the analysis. This removes concerns that they may be susceptible to privacy issues from another group. Dataflows that enter selected processes are included in the privacy boundary and do not have to be documented separately, because they are covered by the description of the data stores. This is to say that these ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required