arrow-left

All pages
gitbookPowered by GitBook
1 of 1

Loading...

O3.6 Establish multi-layered security controls to protect data throughout its lifecycle

O3 Ensure data privacy by design

RI4 Disempowerment

SV4 Technical shortcomings

RS1 Privacy Vulnerability

L2 Strategy and Design

hashtag
Practices

  • Use best security practices, including enabling 2FA by default for users (and/or combining such practices with automated fraud detection practices to detect anomalous activity).

  • Implement encryption protocols that protect all data throughout its transmission and storage. Example: How Estonian xRoad is secured (data storage)

hashtag
Resources

Case Study

( to come soon..)

References

Department of Homeland Security. Privacy Impact Assessments.arrow-up-right