O'Reilly logo

Privacy What Developers and IT Professionals Should Know by J. C. Cannon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Conclusion

Diagramming the data that your application collects, stores, and transmits is a good way to visually validate the data during a review. It can also form the basis for the input to a privacy specification by providing a visual reference for the documentation. Dataflow diagrams are a good method to use to diagram your data. This same methodology is used to perform threat-modeling analyses to mitigate security issues. This helps to streamline privacy and security analyses by using a method that works for both.

Each feature team should diagram the data used by its application and document its findings in a feature specification. This process should eventually be rolled up into a single diagram that represents the data used by a component, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required