✔ 最佳答案
1. limit who has access to sensitive in formation
限制謹指定人仕有權讀取、修改及刪除敏感資料
此舉可保障敏感資料不易外洩或用作聲明以外之用途,更能追查洩密來源, 以保障私隱
2. Accurate validating input data
準確驗證數據
透過人手校驗,確保數據輸入無誤
或透過數據庫校驗功能檢查數據合理性,如範圍檢查、類型檢查、檢查數位(檢查身份證號碼/ISBN真實性用),以確保數據為有用且合理
2012-03-21 01:53:03 補充:
Restriction would like to specify the person the right to read, modify and delete sensitive information
This is to protect the privacy of sensitive information is not easy to be leaked or used for purposes other than the statement, the better to trace the leak source, in order to protect
2012-03-21 01:53:52 補充:
Through manual calibration to ensure that data input is correct
Or through the rationality of the database checksum function test data, such as range checking, type checking, check number (check the identity card number / ISBN authenticity of use) to ensure that the data is useful and reasonable
參考: , Google翻譯, 中文部分係自己上堂學既 英文部分因為我英文差所以用Google翻譯