contact
data acquisition requirments
data functional specifications
target requirements
identify risk patterns exposing your data to algorithms
detect risk patterns live in your data flow
target specifications