The system should be designed, implemented, and operated in accordance with the requirements of any applicable legislation.
Examples include data protection laws, laws controlling the use of cryptographic technology, laws controlling insider dealing on the stock market, and laws governing information that is considered racist, seditious or pornographic.
|
|
| namespace | SABSA |
| stereotype | LegalAttribute |
| softMetric | Independent audit and review against Security Architecture Capability Maturity Model. |
| hardMetric | Verification of the inventory of applicable laws to check for completeness and suitability. |