Difference between revisions of "OWASP Legal Project Roadmap"

From OWASP
Jump to: navigation, search
 
(One intermediate revision by one user not shown)
Line 1: Line 1:
 
The project's overall goal is to...
 
The project's overall goal is to...
  
   Provide support to developers, software buyers, and software sellers in the legal aspects of software security.
+
   Provide support to developers, software buyers, and software
 +
  sellers in the legal aspects of software security.
  
 
In the near term, we are focused on the following tactical goals...
 
In the near term, we are focused on the following tactical goals...
  
 
# Continue to develop the contract annex
 
# Continue to develop the contract annex
# Develop process activities to help people use the annex
+
# Create process activities surrounding sofware security contracting and acquisition
# ...
+
# Integrate the legal process activities into the overall OWASP process materials
  
 
Here are the current tasks defined to help us achieve these goals
 
Here are the current tasks defined to help us achieve these goals
Line 13: Line 14:
 
* Draft the process activity, "Reach agreement on software security"
 
* Draft the process activity, "Reach agreement on software security"
 
* Do a case study to evaluate the usefulness of the annex
 
* Do a case study to evaluate the usefulness of the annex
* ...
 
  
 
[[Category:OWASP Legal Project]]
 
[[Category:OWASP Legal Project]]

Latest revision as of 05:51, 23 June 2006

The project's overall goal is to...

 Provide support to developers, software buyers, and software
 sellers in the legal aspects of software security.

In the near term, we are focused on the following tactical goals...

  1. Continue to develop the contract annex
  2. Create process activities surrounding sofware security contracting and acquisition
  3. Integrate the legal process activities into the overall OWASP process materials

Here are the current tasks defined to help us achieve these goals

  • Draft the process activity, "Reach agreement on software security"
  • Do a case study to evaluate the usefulness of the annex