Privacy

For some data entities access control (authorisation and authentication) or monitoring of use is needed. Take for example requirements that are placed on the access of confidential data. In the GBA there are multiple levels of confidentiality. As such queries of officials are logged and displayed to the civilian yet for investigating officers they are logged and not displayed.

Package Data qualities
Author Bert Dingemans
Alias --
Stereotypes Requirement

Diagrams

Data qualities

This is an overview of the DaMa data qualities. It can be extended with the implications for a specific project

AICP classification

Basic diagram for an AIC classification, for a project this diagram can be extended with the implication for the project of these security requirements

Data Security Technology Services

--

Copyright © Interactory