没有合适的资源?快使用搜索试试~ 我知道了~
首页ISO_IEC_29100_2011信息技术 安全技术 隐私框架.pdf
ISO_IEC_29100_2011信息技术 安全技术 隐私框架.pdf
1星 需积分: 48 96 下载量 90 浏览量
更新于2023-03-03
评论 1
收藏 439KB PDF 举报
ISO / IEC 29100:2011提供了一个隐私框架,该框架指定了通用的隐私术语;定义了参与者及其在处理个人身份信息(PII)中的角色;描述了隐私保护注意事项;andprovides为已知隐私原则引用信息技术 .ISO / IEC 29100:2011是适用于参与指定,采购,架构,设计,开发,测试,维护,管理和操作信息和通信技术系统和服务的自然人和组织处理PII时需要隐私控制的地方。
资源详情
资源评论
资源推荐
ISO/IEC 29100:2011(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2011
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or
ISO's member body in the country of the requester.
ISO copyright office
Case postale 56 CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii
© ISO/IEC 2011 – All rights reserved
ISO/IEC 29100:2011(E)
© ISO/IEC 2011 – All rights reserved iii
Contents Page
Foreword ............................................................................................................................................................. v
Introduction ........................................................................................................................................................ vi
1 Scope ...................................................................................................................................................... 1
2 Terms and definitions ........................................................................................................................... 1
3 Symbols and abbreviated terms .......................................................................................................... 4
4 Basic elements of the privacy framework ........................................................................................... 5
4.1 Overview of the privacy framework ..................................................................................................... 5
4.2 Actors and roles .................................................................................................................................... 5
4.2.1 PII principals .......................................................................................................................................... 5
4.2.2 PII controllers ......................................................................................................................................... 5
4.2.3 PII processors ........................................................................................................................................ 5
4.2.4 Third parties ........................................................................................................................................... 6
4.3 Interactions ............................................................................................................................................ 6
4.4 Recognizing PII ...................................................................................................................................... 7
4.4.1 Identifiers ............................................................................................................................................... 7
4.4.2 Other distinguishing characteristics ................................................................................................... 7
4.4.3 Information which is or might be linked to a PII principal ................................................................ 8
4.4.4 Pseudonymous data ............................................................................................................................. 9
4.4.5 Metadata ................................................................................................................................................. 9
4.4.6 Unsolicited PII ........................................................................................................................................ 9
4.4.7 Sensitive PII ........................................................................................................................................... 9
4.5 Privacy safeguarding requirements .................................................................................................. 10
4.5.1 Legal and regulatory factors .............................................................................................................. 11
4.5.2 Contractual factors .............................................................................................................................. 11
4.5.3 Business factors .................................................................................................................................. 12
4.5.4 Other factors ........................................................................................................................................ 12
4.6 Privacy policies ................................................................................................................................... 13
4.7 Privacy controls ................................................................................................................................... 13
5 The privacy principles of ISO/IEC 29100 ........................................................................................... 14
5.1 Overview of privacy principles .......................................................................................................... 14
5.2 Consent and choice ............................................................................................................................ 14
5.3 Purpose legitimacy and specification ............................................................................................... 15
5.4 Collection limitation ............................................................................................................................ 15
5.5 Data minimization ................................................................................................................................ 16
5.6 Use, retention and disclosure limitation ........................................................................................... 16
5.7 Accuracy and quality .......................................................................................................................... 16
5.8 Openness, transparency and notice ................................................................................................. 17
5.9 Individual participation and access ................................................................................................... 17
5.10 Accountability ...................................................................................................................................... 18
5.11 Information security ............................................................................................................................ 18
5.12 Privacy compliance ............................................................................................................................. 19
Annex A (informative) Correspondence between ISO/IEC 29100 concepts and ISO/IEC 27000
concepts ............................................................................................................................................... 20
Bibliography ...................................................................................................................................................... 21
ISO/IEC 29100:2011(E)
iv © ISO/IEC 2011 – All rights reserved
Figures
Figure 1 – Factors influencing privacy risk management .................................................................................. 11
Tables
Table 1 – Possible flows of PII among the PII principal, PII controller, PII processor and a third party and their
roles 7
Table 2 – Example of attributes that can be used to identify natural persons 8
Table 3 – The privacy principles of ISO/IEC 29100 14
Table A.1 – Matching ISO/IEC 29100 concepts to ISO/IEC 27000 concepts 20
ISO/IEC 29100:2011(E)
© ISO/IEC 2011 – All rights reserved v
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are members of
ISO or IEC participate in the development of International Standards through technical committees
established by the respective organization to deal with particular fields of technical activity. ISO and IEC
technical committees collaborate in fields of mutual interest. Other international organizations, governmental
and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information
technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of the joint technical committee is to prepare International Standards. Draft International
Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as
an International Standard requires approval by at least 75 % of the national bodies casting a vote.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights.
ISO/IEC 29100 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, IT Security techniques.
剩余27页未读,继续阅读
A平头哥
- 粉丝: 8
- 资源: 14
上传资源 快速赚钱
- 我的内容管理 收起
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
会员权益专享
最新资源
- stc12c5a60s2 例程
- Android通过全局变量传递数据
- c++校园超市商品信息管理系统课程设计说明书(含源代码) (2).pdf
- 建筑供配电系统相关课件.pptx
- 企业管理规章制度及管理模式.doc
- vb打开摄像头.doc
- 云计算-可信计算中认证协议改进方案.pdf
- [详细完整版]单片机编程4.ppt
- c语言常用算法.pdf
- c++经典程序代码大全.pdf
- 单片机数字时钟资料.doc
- 11项目管理前沿1.0.pptx
- 基于ssm的“魅力”繁峙宣传网站的设计与实现论文.doc
- 智慧交通综合解决方案.pptx
- 建筑防潮设计-PowerPointPresentati.pptx
- SPC统计过程控制程序.pptx
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论1