Requiring Data Privacy Impact Assessment

In the Republic of the Philippines, any security incident associated with a personal data breach in the information and communication system of a government agency or business enterprise brings forward the question of done security level assessment and the application of information security measures as listed and described in Rule VI of the implementing rules […]

Referencing Validity of Data Privacy by Design

How to determine that the user or consumer requirements for data privacy are embedded into the design, build, integration, test, and release of a new product or service? What are the indicators in the product or service development and operation lifecycles that assure information confidentiality, process integrity, system availability, data privacy, and user safety? The […]

Planning Assumptions in Cybersecurity Strategy

How to determine, describe, document, and demonstrate the elements that compose the valid and verifiable cybersecurity strategy and plan in order to prevent, respond to, and recover from security incidents that are considered cybercrimes? The desk research and product marketing assumptions of subject matter experts, that are associated with cybersecurity requirements, have to be affirmed […]

Gauging results of competence in cybersecurity

Cyberthreat is a product that exploits and does harm. It is continuously developed, integrated, and delivered by cyber threat agents. The threat agent’s means of achieving purpose are what are commonly considered unethical, illegal, and harmful to the life and privacy of a person inside the cyber of digital technology-enabled services of engaging customer, citizen, […]

Developing a Cybersecurity Management Manual

In the Republic of the Philippines, the valid and auditable practice of cybersecurity and data privacy ENSUE from government agencies and business enterprises that have been acting the legal obligations of securing the CYBER of data, information, application, network, storage infrastructure, and people that are threatened by CYBERCRIME and DATA PRIVACY VIOLATION in the information […]

Composing Competence in Cybersecurity, Information Security and Data Privacy

I AM of the digital customer, consumer, or work I AM online… Identified, Authorized, and Monitored inside the network, storage, application, and middleware of service delivery acquired by a controller named TRUST. I AM is… Identity Authenticated and Matched to access privilege and authorized functions that are monitored by a director named SECURE. I AM […]

Appraising Useful National Cybersecurity Plan

The stakeholders in making safe sovereign cyberspace have to agree on the common performance indicators to associate acceptable, actionable, and auditable national cybersecurity plans. Republic Act 10844 which created the Department of Information and Communications Technology has identified the mandated objective to be fulfilled by a government agency related to cybersecurity. “Ensure and protect the […]

About Us

JMLogic Consultancy is a legally registered business in the Republic of the Philippines. It is organized as a content service provider to support the planning, design, and delivery of quality management systems that are related to digital governance, project management, cybersecurity, data privacy, record keeping, business process improvement, and enterprise architecture. We serve organizations -public and […]