Conclusion

Diagramming the data that your application collects, stores, and transmits is a good way to visually validate the data during a review. It can also form the basis for the input to a privacy specification by providing a visual reference for the documentation. Dataflow diagrams are a good method to use to diagram your data. This same methodology is used to perform threat-modeling analyses to mitigate security issues. This helps to streamline privacy and security analyses by using a method that works for both.

Each feature team should diagram the data used by its application and document its findings in a feature specification. This process should eventually be rolled up into a single diagram that represents the data used by a component, ...

Get Privacy What Developers and IT Professionals Should Know now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.