Ah, I remember learning about requirements traceability in my software engineering class. That's the one that links the delivered functionality back to the original requirements, right?
Hmm, I'm a bit unsure about this one. I know we need to restrict access to the full email addresses, but I'm not sure if setting a mask is the only way to do that. Option B about setting a sensitivity classification also seems like it could work. I'll have to think this through carefully.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Erasmo
4 months agoBelen
4 months agoJoye
4 months agoNicholle
4 months agoMarvel
4 months agoRosamond
5 months agoMalinda
5 months agoTerina
5 months agoMarcelle
5 months agoIesha
5 months agoGussie
5 months agoAmos
5 months ago