Skip to content

System Security

System security addresses

  • Confidentiality: The system's data is accessible to authorised users only.
  • Integrity: The system prevents unauthorised access or modification of the model and/or the entire system; by (a) adhering to best security practices1, 2, (b) keeping abreast of vulnerabilities, (c) being non-repudiation proof.
  • Accountability: All system actions are tracked and stored, hence breaches can be systematically investigated.


Therefore, the detail the prospective system's:

  1. Activity Tracking System: For auditability requirements, etc.
  2. System Protection & Privacy Layer: Ensuring adherence to laws and regulations, e.g., GDPR, HIPAA, etc.
  3. Legal Compliance: "… adherence to laws and regulations that are enforced by the government".
  4. Regulatory Compliance: "… adherence to rules and regulations set forth by regulatory bodies that oversee specific industries".
  5. Privacy: Encryption
  6. Authentication System: That ascertains a user's authenticity.
  7. Authorisation System: That ascertains, per user, access to authorised areas only.