O'Reilly logo

Privacy What Developers and IT Professionals Should Know by J. C. Cannon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Conclusion

The database is where most privacy breaches occur. Several steps can be taken to limit the risk of exposure of sensitive data, including removing the sensitive data before it is stored in a database or limiting access to it after it is stored in the database. This is part of the minimization principle that should be applied to data throughout its lifecycle. That is, minimize the data that you collect, minimize access to the data, and minimize the amount of time that you keep the data.

The types of protection you can use to protect data in a database include the following:

  • Physical security

  • Programmatic security

  • Transaction auditing

  • Data minimization

  • Data obfuscation

  • Data quantization

  • Query limitation

  • Data suppression

  • Data encryption

  • Data perturbation ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required