Guideline 35. Institutional framework for the application of mobile technologies

Submitted by Anonymous (not verified) on

The institution establishes a framework for the application of mobile technologies which defines the main procedures, duties and responsibilities, and technical standards, and includes an application strategy plan.

The application strategy could be a medium-term, three- to five-year plan.

B.3. Mobile Technologies

Submitted by Anonymous (not verified) on

This section of the guidelines covers the types of mobile services which social security institutions might offer, and their technological and organizational implications. These may vary according to the current level of deployment of mobile technologies in the country and institution concerned. The five guidelines which follow will assist those responsible for developing mobile services to focus on the technical decisions and choices to be made. They take account of success stories in both social security and other types of institutions, and of all existing technologies.

Guideline 30. Comprehensive access control system

Submitted by Anonymous (not verified) on

The institution implements a comprehensive system to control access to technological equipment and devices and software systems.

This includes mechanisms for data access control, endpoint access control, authentication and identification, user privilege management, network access control, password management and logs.

Guideline 29. Security measures for data privacy

Submitted by Anonymous (not verified) on

The institution establishes security measures to enforce data privacy policies for personal and sensitive data in particular.

This covers specific security issues affecting the implementation of a global system for the protection of privacy and personal data, and measures specifically related to privacy and personal data (covering both routine files containing personal data and sensitive personal data files).