Security

California Identity Theft Laws & Application Security: AB 1950, SB 1386, and Beyond

Download Now Free registration required

Executive Summary

Application security and automated tools to assess application security vulnerabilities protect computerized information accessible through Web-enabled applications. Accordingly, application security tools are crucial for preventing unauthorized access, destruction, use, modification, or disclosure of personal information available through Web applications, as required by AB 1950. The Cenzic Hailstorm solution helps companies comply with AB 1950, because companies can use automated processes to asses risk, check for vulnerabilities, test code and controls during software development for the purpose of preventing unauthorized access, destruction, use, modification, or disclosure of personal information.

  • Format: PDF
  • Size: 221.66 KB