O'Reilly logo

Privacy What Developers and IT Professionals Should Know by J. C. Cannon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13. Protecting Database Data

Databases are used extensively in our daily lives. Just about every time we make a purchase, withdraw money, log in to a computer, or use a badge to activate an electronic door, data about us is being captured in or retrieved from a database. Everyone who gets one of your checks or reads your credit card to fulfill a transaction has an opportunity to add your information to a database. Think about when you buy an item at a yard sale with a check. That person has the opportunity to capture all the personal information on your check in a database. Some nightclubs are even making electronic copies of their patrons' driver's license information when they enter the club. Although sophistication in the ways data ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required