Home Computer Science Calm Technology. Principles and Patterns for Non-Intrusive Design
Think about it . Running an Internet-connected product or service isn’t the same as just providing a physical product to someone . You’re taking and caring for a piece of them at the same time . You’re not just hosting their data—you’re hosting them! It’s a big responsibility. Hosting user data is a privilege, not a right . Privacy policies are regret-management tools . Legislation being put in place will increasingly require these .
This outline is a good start . And it will also bring up questions to your engineering team on how data is stored and protected to begin with
ANTICIPATE AND EXPECT SECURITY BREACHES
Security breaches are organic manifestations, not mechanical ones . They come from two places: people looking for ways to take advantage of or get data and personal information out, or people simply playing with systems to see if they can work around them or break them . A lot of this is done unofficially, not by people with nine-to-five hours, but by people playing in their free time . The best thing to do is to get to know and respect these people. And hire them! Security is a difficult thing to get support for, even with all of the hacks that are currently going on, because investing the money doesn’t net returns . Most companies don’t allocate resources for attacks until they’ve happened . Then they spend a lot of money fixing hacked systems, when the hacks could have been prevented if security principles had been adopted in the early stages of product development .
|< Prev||CONTENTS||Next >|