Part I of this three-part Executive Update series provided a short overview of how information security and privacy controls are -- or more often are not -- built into software, and also reviewed the responses to the first set of questions of a Cutter survey on developing privacy-sensitive software.
Executive Update
Building Privacy Controls into Software, Part II
Posted October 9, 2014 | Technology |
Don’t have a login?
Make one! It’s free and gives you access to all Cutter research.