- developing attributes/extensions into existing information systems that allow attributes(individual columns) to be marked as "personally identifiable"
- developing triggers/stored procedures that log every access and modification of that information
- developing triggers/stored procedures that check/verify proper access to that data
- developing automated batch queries/scripts/jobs that remove personally identifiable stale information (hasn't been CRU for x amount of time) from a database
- Adopting the "Convention over Configuration" approach to automatically apply this to certain types of records (i.e. Customer, User, Patient)
Monday, November 1, 2010
On the development of an automated privacy management scheme for relational database management systems
We can develop a methodology for automatically improving privacy protection in systems that store personal information by:
Labels:
"software",
privacy management,
research question,
security
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment