(i) If possible, use the algorithm on the “e-Government Recommended Ciphers List”
(ii) Use algorithms on the “e-Government Recommended Ciphers List” when newly implementing an information system, or introducing encryption or electronic signature at an update. If enabling a selection from multiple algorithms for encryption or electronic signatures, include at least one from the “e-Government Recommended Ciphers List.”
(iii) Examine the necessity of an emergency response plan in the case of an algorithm compromise. Define an emergency response plan if it is deemed necessary.