Build trust and confidence


  • Identify what data needs to be collected by the service and for what purpose 



  • Design the service to meet security requirements; talk to your ICT or cybersecurity experts at the outset to help with this 
  • Carry out security testing (e.g. pen testing) to identify and fix any vulnerabilities 
  • Have a plan to manage the on-going security of the service 


Last updated