Ah, I remember learning about requirements traceability in my software engineering class. That's the one that links the delivered functionality back to the original requirements, right?
Hmm, I'm a bit unsure about this one. I know we need to restrict access to the full email addresses, but I'm not sure if setting a mask is the only way to do that. Option B about setting a sensitivity classification also seems like it could work. I'll have to think this through carefully.
upvoted 0
times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Erasmo
5 months agoBelen
6 months agoJoye
6 months agoNicholle
6 months agoMarvel
6 months agoRosamond
6 months agoMalinda
6 months agoTerina
6 months agoMarcelle
7 months agoIesha
7 months agoGussie
7 months agoAmos
7 months ago