| CPC G06F 8/73 (2013.01) [G06F 21/60 (2013.01); G06F 40/242 (2020.01)] | 20 Claims |

|
1. A computer-implemented method comprising:
correlating, by a processor, a context of a written data privacy requirement with a first code segment of a source code of a target computer system;
receiving, by the processor, a selection of a first candidate code segment to replace the first code segment;
determining, by the processor, that the selected first candidate code segment has replaced the first code segment and is integrated into the source code;
transmitting, by the processor, a stimulation signal to the target computer system, wherein the stimulation signal is directed toward the first candidate code segment integrated into the source code; and
determining, by the processor, whether the source code with the first candidate code segment replacing the first code segment is in compliance with the written data privacy requirement based on an output to the stimulation signal.
|