Executive Update

Building Privacy Controls into Software, Part II

Posted October 9, 2014 | Technology |

Part I of this three-part Executive Update series provided a short overview of how information security and privacy controls are -- or more often are not -- built into software, and also reviewed the responses to the first set of questions of a Cutter survey on developing privacy-sensitive software.

About The Author
Rebecca Herold
Rebecca Herold, CISSP, CISA, CISM, CIPM, CIPT, CIPP/US, FLMI, is CEO, The Privacy Professor; Partner, Compliance Helper; and owner/partner for HIPAACompliance.org. Ms. Herold has more than two decades of privacy and information security experience and has provided information security, privacy, and compliance services to organizations in a wide range of industries throughout the world. She has been named among the "Best Privacy Advisers"… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.