Security. Your security considerations should include, but are not limited to the following:
Authenticity
Accountability
USER SECURITY As a recipient, I want to be aware of who and when recipients access the data
As a recipient, I do want my data to be stored in a safe location, for which only I can access
|
---|
SECRET SECURITY As a developer, I want the system store the data in secure location, to protect the privacy of sensitive information
As a developer, I want specific (private) information to not be accessible, by fellow developers ensuring the privacy of our recipient’s information
|
SERVER SECURITY As a developer, I want to ensure the upmost level of security for a user recipient
|
...