Recently Updated Pages
Initiation
During the initiation stage security risk assessment and security planning for the software proje...
Software Life Cycle
The table below summarizes the security considerations at each stage of the software life cycle: ...
Scope and objectives
These guidelines define best practices on software security that should be adopted during the imp...
Introduction
This document serves as a comprehensive resource for integrating security principles, practices, ...
Upgrade or Decommission
Data Disposal [Mandatory] - Ensure that all personal data stored by the software is securely de...
Operations and Maintenance
Privacy policies [Mandatory] - Regularly review and update privacy policies and procedures to r...
Deployment
Data protection safeguards [Mandatory] - Implement appropriate safeguards to protect personal d...
Testing
Privacy testing [Mandatory] - Include privacy testing as part of the software testing process, ...
Development
Secure coding [Mandatory] - Follow secure coding practices to prevent common vulnerabilities s...
Design
Privacy design principles [Mandatory] - Apply privacy principles such as data minimization, pur...
Requirements Gathering and Analysis
Define privacy requirements [Mandatory] - Identify and document privacy requirements based on b...
Respect for User Privacy
Above all, Privacy by Design requires architects and operators to keep the interests of the indiv...
Visibility and Transparency
Privacy by Design seeks to assure all stakeholders that whatever the business practice or technol...
End-to-End Security – Lifecycle Protection
Privacy by Design, having been embedded into the system before the first element of information b...
Full Functionality – Positive-Sum, not Zero-Sum
Privacy by Design seeks to accommodate all legitimate interests and objectives in a positive-sum ...
Privacy Embedded into Design
Privacy by Design is embedded into the design and architecture of IT systems and business practic...
Privacy as the Default
Privacy by Design seeks to deliver the maximum degree of privacy by ensuring that personal data a...
Proactive not Reactive; Preventative not Remedial
The Privacy by Design approach is characterized by proactive rather than reactive measures. It an...
Why it's Important to Build in Privacy by Design
Taking a privacy by design approach is an essential tool in minimizing privacy risks and building...
What is Privacy by Design?
Privacy by Design is about creating a consistent framework and approach for proactively embedding...