IDEF Recommended Technology Enforcement, v1.0

Specifies best practices in accordance with Identity Ecosystem Framework (IDEF) best practice PRIVACY-BP-B: RECOMMENDED TECHNOLOGY ENFORCEMENT.

Assessment Step

1
Recommended Technology Enforcement (RecommendedTechnologyEnforcement)
Does the entity (a) implement privacy requirements and policies through technical mechanisms wherever feasible, and (b) implement those technical privacy controls as low in the technology stack as possible?
Artifact
A1
Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) and supporting notes as appropriate to support the assessor's response to this assessment step.

Conformance Criteria (1)

Recommended Technology Enforcement
Wherever feasible, privacy requirements and policies SHOULD be implemented through technical mechanisms. Those technical privacy controls SHOULD be situated as low in the technology stack as possible.
Citation
IDEF
Page 54