Presentation is loading. Please wait.

Presentation is loading. Please wait.

P RIVACY P ROJECT CS 532 M ID T ERM II P RESENTATION Compliance Group Anusha Kuppagiri Swatantra Kumar Tanuja Tottempudi.

Similar presentations


Presentation on theme: "P RIVACY P ROJECT CS 532 M ID T ERM II P RESENTATION Compliance Group Anusha Kuppagiri Swatantra Kumar Tanuja Tottempudi."— Presentation transcript:

1 P RIVACY P ROJECT CS 532 M ID T ERM II P RESENTATION Compliance Group Anusha Kuppagiri Swatantra Kumar Tanuja Tottempudi

2 H OW THIS PROJECT IS RELEVANT TO US ? 1. Facebook/Social Networking Privacy concerns Location aware services Information published online and its usage 2. Financial Reforms and predatory consumer lending practices Need to protect consumers and their credit information Protect consumers from predatory lending practices

3 O THER S ECTORS WITH P RIVACY CONCERNS 1. Healthcare Health Insurance Portability and Accountability Act (HIPAA) 2. Military Identity Protection Social Rights Protection

4 S OFTWARE P ROCESS M ETHODOLOGY 1. Waterfall Cannot accommodate changes after a phase is locked- down 2. Evolutionary Reduced time-to-market and quick delivery of components Exploratory development with room for changes Allows prototyping Using Rational Unified Process since it is well-defined 3. Component-based software engineering Cannot find open/free off-the-shelf components for tailoring to stakeholder needs

5 T EAM M EMBERS & R OLES 1. Tanuja Tottempudi Requirements elicitation, management, and change control Project Management and Communications Design (High Level) 2. Anusha Kuppagiri Design (High Level and Detailed) 3. Swatantra Kumar Test planning Test cases Testing

6 R EQUIREMENTS E NGINEERING P ROCESS Requirements Elicitation (Techniques used) 1. Interviews 2. Requirements workshops 3. Scenarios and Use cases Requirements Specifications 1. Absolute Reference 2. Implementation Method 3. Priority 4. Status 5. Historic ID 6. Risks Please refer to http://code.google.com/p/privacysuite/downloads/listhttp://code.google.com/p/privacysuite/downloads/list Compliance_Approved_Requirements_Specification.xlsx Requirements Change Management Basic version control in favor of IBM Rational Requisite Pro

7 U SE C ASE : C USTOMER I DENTIFICATION Requestor calls contact center Agent inputs customer identity information System determines customer identifier Please refer to use case present in http://code.google.com/p/privacysuite/downloads/list Privacy_Preference_Center_Validate_Requestor_U se_Case.docx

8 U SE C ASE : C APTURE P RIVACY E LECTIONS Customer provides elections Agent reconfirms before submitting the elections Agent reads privacy disclosure Agent submits the request Please refer to use case: http://code.google.com/p/privacysuite/downloads/list Privacy_Preference_Center_Capture_Privacy_Elect ions_Use_Case.doc

9 U SE C ASE : R ESOLVE E XCEPTIONS Operations Agent opens exception Agent researches the case and determines unique customer identifier Agent resolves exception and submits privacy elections Please refer to use case: http://code.google.com/p/privacysuite/downloads/list Resolve_Privacy_Exception_Request_Use_Case.doc

10 C REDITS Kishore D (Providing Privacy Expertise and Requirements) Dr. Robert Zhu (Mentoring and Process Guidance)


Download ppt "P RIVACY P ROJECT CS 532 M ID T ERM II P RESENTATION Compliance Group Anusha Kuppagiri Swatantra Kumar Tanuja Tottempudi."

Similar presentations


Ads by Google