O'Reilly logo

Privacy What Developers and IT Professionals Should Know by J. C. Cannon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Program Overview

In this fictitious doctor's office, there is a separate network and database administrator. There is also a developer who creates the encryption and decryption code as a COM object. The developer creates the code on a separate machine using dummy data for testing. The users of the application can only access the patient data using the application. They are provided with login IDs to access their client machines, but no SQL Server access. The ASP pages in the program contain the SQL Server ID and password and point to a system DSN. The login ID is limited to performing reads and insertions on only two tables.

Categorizing the Columns of a Table

Each column in the Patient table, shown in Figure 14.13, is assigned a data category. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required