Executive Update

Building Privacy Controls into Software, Part II

Posted October 9, 2014 in Business Technology & Digital Transformation Strategies, Business Agility & Software Engineering Excellence, Data Analytics & Digital Technologies

Part I of this three-part Executive Update series provided a short overview of how information security and privacy controls are -- or more often are not -- built into software, and also reviewed the responses to the first set of questions of a Cutter survey on developing privacy-sensitive software.

About The Author
Rebecca Herold
Rebecca Herold, CISSP, CISA, CISM, CIPM, CIPT, CIPP/US, FLMI, is a Senior Consultant with Cutter Consortium's Business Technology & Digital Transformation Strategies practice. She is also CEO, The Privacy Professor; Partner, Compliance Helper; and owner/partner for HIPAACompliance.org. Ms. Herold has more than two decades of privacy and information security experience and has provided information security, privacy, and compliance services to… Read More
Not a member? Gain Access to the Cutter Experts today — register now to read select open-access articles.