In this session, let’s look at the mechanics of identifying and eliminating phone numbers, credit cards, email addresses, and the other things that are more risk than they’re worth.
There are two constants in software development: every app will eventually read email and our security/compliance teams will definitely not like our next idea. While we can’t avoid reading email, we can work to make peace with our security team by considering their requirements earlier in our work.
So let’s rethink our approach. Instead of collecting everything and hoping for the best, let’s acknowledge the risks and be thoughtful about what we capture.