SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Privacy by Design
of
Privacy by Re-engineering?
Are your applications GDPR compliant?
Andre Cardinaal
Business Consultant @GDPR Coach
andre.cardinaal@gdprcoach.nl
Agenda
• Context - Why Privacy by Design(PbD) is imminent
• Principles involved
• Approaches to implement
• Fit it into System Design
• Methods of Madness
• GDPR & Privacy by Design
• Concept test - Scorecard
Why Privacy by Design
• Prevention is better than cure!
• Robust processes are key to sound business
• Avoid legislative and statutory scrutiny
• Avoid financial losses and penalties due to breaches
• Increase brand equity by enhanced customer trust
Principles of Privacy by Design
• Proactive not reactive — preventative not remedial
• Lead with privacy as the default setting
• Embed privacy into design
• Retain full functionality (positive-sum, not zero-sum)
• Ensure end-to-end security
• Maintain visibility and transparency—keep it open
• Respect user privacy—keep it user-centric
Approaches to implement PbD
• Add Privacy requirements to system requirements
for planning, costing, sprinting and quality outcomes
• Data flow mappings as input to Architecture
• PbD scorecard to be part of Definition of Done(DoD)
• Compliance to privacy requirements, like security requirements,
to be mandatory for production release
Foundational phases for PbD
ANALYSYS DESIGN DEVELOP
Technique
• De-identification
• Obfuscation
• Anonymization
• Encryption /
Decryption
Concept
• Data Mapping
• PIA
Approach
• Minimal Data
• Limit to purpose
• Limit retention
• By / From
retention
PbD from scratch
Data Mapping
• Understand Information Flow
• Comprehend Information Flow
• Segregate Data items
• Data items
• Formats
• Transfer Methods
• Location: From / To
• Accountability
• Access
PIA
• Gather Info & Generate Flow
• Size and Scope
• Consult with Stakeholders
• Check flow against principles
• Risk Management
• Identify Risks
• Identify Mitigation approach
System Design
Requirements
Analysis
Design
Development
Deployment
Maintenance/
Operation
System Design
Requirements
Analysis
Design
Development
Deployment
Maintenance/
Operation
User interviews, PIA, Cross-border,
Business/User/Law/Compliance needs
Privacy Laws, Customer rights, Business
needs, Crossborder/Cloud aspects
Workflow, Data flow maps, Approvals,
Data Security, Obfuscation,
Anonymization, Encryption/Decryption,
User/Role/Screen/Field/Operation level
access
Scorecard, Checklists, DoD,
UAT, Privacy reviews
Cross Border, Local privacy
laws, Cloud,
Scorecards, Maturity models,
Privacy certifications,
Assessments,Internal Reviews
Developer’s role - Privacy by Design
• Comprehend and define legal perimeter of operations
• Collaborate with communication & consent
• Use proper common sense and ethics for system design
• Data lifecycle - security, quality and archival
• Ensure Positive-Sum not Zero-Sum
• Framework in place: Policies, Standards, Guidelines
• Practice privacy: Product Owners, Architects, Developers
• Privacy by Design - NFR, SDLC, Checklists, Dataflow maps
• Continuous evaluation and Compliance
Methods of Madness
• Cookies notification alone isnt enough!
• Being safe & secure isnt being privacy enabled!
• Handling privacy isnt a task, it’s a process to fulfilled at several stages
in increments, in iteration.
• Law is law, don’t draw your conclusions, consult experts
• Migrate to Privacy by design by default
GDPR & Privacy by Design
• Philosophy
• Privacy by Design, by default
• Demonstrate privacy efforts during design, development
• Para [1] 7 [2] of Art 25 clearly advocates Privacy by design and Privacy
by default in spirit and letter.
• Para [3] of Art 25 makes demonstration of efforts for compliance to
para [1]&[2] as mandatory.
Final Checklist
• Dataflow maps
• Privacy Impact Assessment reports
• Customer rights Vs Business Needs
• Privacy Laws, applicable provisions, guidelines
• Non functional requirements
• Scorecards
• Maturity Model, spider charts
Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

DEF CON 23: Internet of Things: Hacking 14 Devices
DEF CON 23: Internet of Things: Hacking 14 DevicesDEF CON 23: Internet of Things: Hacking 14 Devices
DEF CON 23: Internet of Things: Hacking 14 Devices
Synack
 
Iso27001 The Road To Certification
Iso27001   The Road To CertificationIso27001   The Road To Certification
Iso27001 The Road To Certification
tschraider
 
ISMS Awareness IT Staff
ISMS Awareness IT StaffISMS Awareness IT Staff
ISMS Awareness IT Staff
Tooba Khaliq
 
Segregation of Duties Solutions
Segregation of Duties SolutionsSegregation of Duties Solutions
Segregation of Duties Solutions
Ahmed Abdul Hamed
 

Was ist angesagt? (20)

Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your Organziation
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
 
Free and open cloud security posture monitoring
Free and open cloud security posture monitoringFree and open cloud security posture monitoring
Free and open cloud security posture monitoring
 
BA Techniques BABOK
BA Techniques BABOKBA Techniques BABOK
BA Techniques BABOK
 
Design Architecture Review Board (ARB) to Enable Digital Strategy
Design Architecture Review Board (ARB) to Enable Digital Strategy Design Architecture Review Board (ARB) to Enable Digital Strategy
Design Architecture Review Board (ARB) to Enable Digital Strategy
 
Webinar - PCI PIN, PCI cryptography & key management
Webinar - PCI PIN, PCI cryptography & key managementWebinar - PCI PIN, PCI cryptography & key management
Webinar - PCI PIN, PCI cryptography & key management
 
DEF CON 23: Internet of Things: Hacking 14 Devices
DEF CON 23: Internet of Things: Hacking 14 DevicesDEF CON 23: Internet of Things: Hacking 14 Devices
DEF CON 23: Internet of Things: Hacking 14 Devices
 
Iso27001 The Road To Certification
Iso27001   The Road To CertificationIso27001   The Road To Certification
Iso27001 The Road To Certification
 
ISMS Awareness IT Staff
ISMS Awareness IT StaffISMS Awareness IT Staff
ISMS Awareness IT Staff
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOX
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
Societal Security – the new standard ISO 22301 for Business Continuity Manage...
Societal Security – the new standard ISO 22301 for Business Continuity Manage...Societal Security – the new standard ISO 22301 for Business Continuity Manage...
Societal Security – the new standard ISO 22301 for Business Continuity Manage...
 
Network Architecture Review Checklist
Network Architecture Review ChecklistNetwork Architecture Review Checklist
Network Architecture Review Checklist
 
Erp Implementation Methodology Wkshp 2.0 120611
Erp Implementation Methodology Wkshp 2.0 120611Erp Implementation Methodology Wkshp 2.0 120611
Erp Implementation Methodology Wkshp 2.0 120611
 
Capability maturity model
Capability maturity modelCapability maturity model
Capability maturity model
 
Communicating with stakeholders on cybersecurity risk-a road map for success
Communicating with stakeholders on cybersecurity risk-a road map for successCommunicating with stakeholders on cybersecurity risk-a road map for success
Communicating with stakeholders on cybersecurity risk-a road map for success
 
Segregation of Duties Solutions
Segregation of Duties SolutionsSegregation of Duties Solutions
Segregation of Duties Solutions
 
Security architecture - Perform a gap analysis
Security architecture - Perform a gap analysisSecurity architecture - Perform a gap analysis
Security architecture - Perform a gap analysis
 
The Key Role of Business Analysis in Project Success and Achieving Business V...
The Key Role of Business Analysis in Project Success and Achieving Business V...The Key Role of Business Analysis in Project Success and Achieving Business V...
The Key Role of Business Analysis in Project Success and Achieving Business V...
 
PCI DSS for Penetration Testing
PCI DSS for Penetration TestingPCI DSS for Penetration Testing
PCI DSS for Penetration Testing
 

Ähnlich wie Privacy by Design or Privacy by Re-engineering

Rega solutions ppt [compatibility mode]
Rega solutions ppt [compatibility mode]Rega solutions ppt [compatibility mode]
Rega solutions ppt [compatibility mode]
rickkhosla
 
Abitech Software - Collaboration Options
Abitech Software - Collaboration OptionsAbitech Software - Collaboration Options
Abitech Software - Collaboration Options
Andrew Pyshkin
 
First bankcard presentation 3.3.15
First bankcard presentation 3.3.15First bankcard presentation 3.3.15
First bankcard presentation 3.3.15
Julie McDonald
 
Auxenta Services
Auxenta ServicesAuxenta Services
Auxenta Services
Sam Salazar
 
Smart Company Profile
Smart Company ProfileSmart Company Profile
Smart Company Profile
sumitchugh08
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Ontario Cloud SIG
 

Ähnlich wie Privacy by Design or Privacy by Re-engineering (20)

Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...
 
Accelerating the Path to GDPR Compliance
Accelerating the Path to GDPR ComplianceAccelerating the Path to GDPR Compliance
Accelerating the Path to GDPR Compliance
 
Cdpse course content infosec train
Cdpse course content infosec trainCdpse course content infosec train
Cdpse course content infosec train
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
Data architecture around risk management
Data architecture around risk managementData architecture around risk management
Data architecture around risk management
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
Blur De-Identification
Blur De-IdentificationBlur De-Identification
Blur De-Identification
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial Services
 
Rega solutions ppt [compatibility mode]
Rega solutions ppt [compatibility mode]Rega solutions ppt [compatibility mode]
Rega solutions ppt [compatibility mode]
 
Happiest Minds Technologies- ComplianceVigil Solution Overview
Happiest Minds Technologies- ComplianceVigil Solution OverviewHappiest Minds Technologies- ComplianceVigil Solution Overview
Happiest Minds Technologies- ComplianceVigil Solution Overview
 
Abitech Software - Collaboration Options
Abitech Software - Collaboration OptionsAbitech Software - Collaboration Options
Abitech Software - Collaboration Options
 
First bankcard presentation 3.3.15
First bankcard presentation 3.3.15First bankcard presentation 3.3.15
First bankcard presentation 3.3.15
 
Agile and Its Impact on Productivity
Agile and Its Impact on ProductivityAgile and Its Impact on Productivity
Agile and Its Impact on Productivity
 
How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...
 
Auxenta Services
Auxenta ServicesAuxenta Services
Auxenta Services
 
bh-win-04-conacher.ppt
bh-win-04-conacher.pptbh-win-04-conacher.ppt
bh-win-04-conacher.ppt
 
Smart Company Profile
Smart Company ProfileSmart Company Profile
Smart Company Profile
 
Privacy Engineering in the Wild
Privacy Engineering in the WildPrivacy Engineering in the Wild
Privacy Engineering in the Wild
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
 
Software Engineering Ethics
Software Engineering EthicsSoftware Engineering Ethics
Software Engineering Ethics
 

Kürzlich hochgeladen

%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 

Kürzlich hochgeladen (20)

WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 

Privacy by Design or Privacy by Re-engineering

  • 1. Privacy by Design of Privacy by Re-engineering? Are your applications GDPR compliant? Andre Cardinaal Business Consultant @GDPR Coach andre.cardinaal@gdprcoach.nl
  • 2. Agenda • Context - Why Privacy by Design(PbD) is imminent • Principles involved • Approaches to implement • Fit it into System Design • Methods of Madness • GDPR & Privacy by Design • Concept test - Scorecard
  • 3. Why Privacy by Design • Prevention is better than cure! • Robust processes are key to sound business • Avoid legislative and statutory scrutiny • Avoid financial losses and penalties due to breaches • Increase brand equity by enhanced customer trust
  • 4. Principles of Privacy by Design • Proactive not reactive — preventative not remedial • Lead with privacy as the default setting • Embed privacy into design • Retain full functionality (positive-sum, not zero-sum) • Ensure end-to-end security • Maintain visibility and transparency—keep it open • Respect user privacy—keep it user-centric
  • 5. Approaches to implement PbD • Add Privacy requirements to system requirements for planning, costing, sprinting and quality outcomes • Data flow mappings as input to Architecture • PbD scorecard to be part of Definition of Done(DoD) • Compliance to privacy requirements, like security requirements, to be mandatory for production release
  • 6. Foundational phases for PbD ANALYSYS DESIGN DEVELOP Technique • De-identification • Obfuscation • Anonymization • Encryption / Decryption Concept • Data Mapping • PIA Approach • Minimal Data • Limit to purpose • Limit retention • By / From retention
  • 7. PbD from scratch Data Mapping • Understand Information Flow • Comprehend Information Flow • Segregate Data items • Data items • Formats • Transfer Methods • Location: From / To • Accountability • Access PIA • Gather Info & Generate Flow • Size and Scope • Consult with Stakeholders • Check flow against principles • Risk Management • Identify Risks • Identify Mitigation approach
  • 9. System Design Requirements Analysis Design Development Deployment Maintenance/ Operation User interviews, PIA, Cross-border, Business/User/Law/Compliance needs Privacy Laws, Customer rights, Business needs, Crossborder/Cloud aspects Workflow, Data flow maps, Approvals, Data Security, Obfuscation, Anonymization, Encryption/Decryption, User/Role/Screen/Field/Operation level access Scorecard, Checklists, DoD, UAT, Privacy reviews Cross Border, Local privacy laws, Cloud, Scorecards, Maturity models, Privacy certifications, Assessments,Internal Reviews
  • 10. Developer’s role - Privacy by Design • Comprehend and define legal perimeter of operations • Collaborate with communication & consent • Use proper common sense and ethics for system design • Data lifecycle - security, quality and archival • Ensure Positive-Sum not Zero-Sum • Framework in place: Policies, Standards, Guidelines • Practice privacy: Product Owners, Architects, Developers • Privacy by Design - NFR, SDLC, Checklists, Dataflow maps • Continuous evaluation and Compliance
  • 11. Methods of Madness • Cookies notification alone isnt enough! • Being safe & secure isnt being privacy enabled! • Handling privacy isnt a task, it’s a process to fulfilled at several stages in increments, in iteration. • Law is law, don’t draw your conclusions, consult experts • Migrate to Privacy by design by default
  • 12. GDPR & Privacy by Design • Philosophy • Privacy by Design, by default • Demonstrate privacy efforts during design, development • Para [1] 7 [2] of Art 25 clearly advocates Privacy by design and Privacy by default in spirit and letter. • Para [3] of Art 25 makes demonstration of efforts for compliance to para [1]&[2] as mandatory.
  • 13. Final Checklist • Dataflow maps • Privacy Impact Assessment reports • Customer rights Vs Business Needs • Privacy Laws, applicable provisions, guidelines • Non functional requirements • Scorecards • Maturity Model, spider charts