Recently Updated Pages
Operations and Maintenance
During this stage, the software is in production and operating. Continuous enhancements or modifi...
Deployment Phase
Security configurations[Mandatory] - When deploying software, ensure appropriate security confi...
Testing
following should be considered in the Testing phase: Test planning [Mandatory]- Planning for ...
Development
Secure coding [Mandatory] - In the development stage security requirements and design should be...
Architecture & Design
This stage involves ensuring security is considered as part of the overall system architecture de...
Acquisition
Software can be acquired either through external procurement or in-house development. For the Gov...
Initiation
During the initiation stage security risk assessment and security planning for the software proje...
Software Life Cycle
The table below summarizes the security considerations at each stage of the software life cycle: ...
Scope and objectives
These guidelines define best practices on software security that should be adopted during the imp...
Introduction
This document serves as a comprehensive resource for integrating security principles, practices, ...
Entry into force
This guideline shall come into force on the date of its signature by the Chief Executive Officer ...
Upgrade or Decommission
Data Disposal [Mandatory] - Ensure that all personal data stored by the software is securely de...
Operations and Maintenance
Privacy policies [Mandatory] - Regularly review and update privacy policies and procedures to r...
Deployment
Data protection safeguards [Mandatory] - Implement appropriate safeguards to protect personal d...
Testing
Privacy testing [Mandatory] - Include privacy testing as part of the software testing process, ...
Development
Secure coding [Mandatory] - Follow secure coding practices to prevent common vulnerabilities s...
Design
Privacy design principles [Mandatory] - Apply privacy principles such as data minimization, pur...
Requirements Gathering and Analysis
Define privacy requirements [Mandatory] - Identify and document privacy requirements based on b...
Respect for User Privacy
Above all, Privacy by Design requires architects and operators to keep the interests of the indiv...
Visibility and Transparency
Privacy by Design seeks to assure all stakeholders that whatever the business practice or technol...