Article 25
|
(Integrity of Software and Information)
- A core system shall use integrity validation tools to detect unauthorized change of specific software and information. It is advisable for a non-core system to use integrity validation tools.
- The legality of data entered by users of a core system shall be verified server side of the application system.
- Safety protection measures designated by an organization shall be implemented should the information and communication system discover a breach of integrity.
- It is advisable for the core systems of a type 1 organization to verify the integrity of software and information periodically.
|