1 / 5

Privacy Requirements Definition and Verification

Privacy Requirements Definition and Verification. POC: Stuart Shapiro sshapiro@mitre.org. Approved for Public Release: 12-4246. Distribution Unlimited. Privacy Requirements Definition and Testing as an Integrated Process. Privacy Testing as Part of Overall System Development Process .

taro
Download Presentation

Privacy Requirements Definition and Verification

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy Requirements Definition and Verification POC: Stuart Shapiro sshapiro@mitre.org Approved for Public Release: 12-4246. Distribution Unlimited.

  2. Privacy Requirements Definition and Testing as an Integrated Process Privacy Testing as Part of Overall System Development Process • Objective: Expand requirements definition and testing to ensure privacy is enforced in systems development throughout the development life cycle Vision & Strategy/ Privacy Principles Privacy Requirements included in System Design Privacy included in System Integration Testing and Validation Application Requirements/ • Privacy Requirements Integration, Test, and Evaluation Privacy included in Unit Testing Design Development

  3. Business Process Structuring Privacy Requirements • System Development ContextualPrivacy Requirements • Privacy Principles • Privacy Framework • General Privacy Requirements • System • Detailed System Requirements • System Tests • Operations

  4. Implementing and Testing Privacy System RequirementsExample: PII Minimization PII entering the system from other systems shall be limited to predetermined data elements. Software Requirements System retrieves unnecessary data elements Execute Test Plan Unit Test Plan Implemented Component Fail Execute queries against a data source to verify data elements being retrieved System only retrieves necessary data elements Pass

More Related