{"id":394771,"date":"2024-10-20T04:15:40","date_gmt":"2024-10-20T04:15:40","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iso-iec-291012021\/"},"modified":"2024-10-26T07:58:27","modified_gmt":"2024-10-26T07:58:27","slug":"bs-en-iso-iec-291012021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iso-iec-291012021\/","title":{"rendered":"BS EN ISO\/IEC 29101:2021"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
5<\/td>\nEuropean foreword
Endorsement notice <\/td>\n<\/tr>\n
10<\/td>\nForeword <\/td>\n<\/tr>\n
11<\/td>\nIntroduction <\/td>\n<\/tr>\n
13<\/td>\n1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Overview of the privacy architecture framework
5.1 Elements of the framework <\/td>\n<\/tr>\n
15<\/td>\n5.2 Relationship with management systems
6 Actors and PII
6.1 Overview <\/td>\n<\/tr>\n
16<\/td>\n6.2 Phases of the PII processing life cycle
6.2.1 Collection <\/td>\n<\/tr>\n
17<\/td>\n6.2.2 Transfer
6.2.3 Use <\/td>\n<\/tr>\n
18<\/td>\n6.2.4 Storage
6.2.5 Disposal
7 Concerns
7.1 Overview
7.2 The privacy principles of ISO\/IEC 29100 <\/td>\n<\/tr>\n
19<\/td>\n7.3 Privacy safeguarding requirements
8 Architectural views
8.1 General <\/td>\n<\/tr>\n
20<\/td>\n8.2 Component view
8.2.1 General <\/td>\n<\/tr>\n
21<\/td>\n8.2.2 Privacy settings layer <\/td>\n<\/tr>\n
24<\/td>\n8.2.3 Identity management and access management layer <\/td>\n<\/tr>\n
26<\/td>\n8.2.4 PII layer <\/td>\n<\/tr>\n
31<\/td>\n8.3 Actor view
8.3.1 General <\/td>\n<\/tr>\n
32<\/td>\n8.3.2 ICT system of the PII principal
8.3.3 ICT system of the PII controller <\/td>\n<\/tr>\n
33<\/td>\n8.3.4 ICT system of the PII processor <\/td>\n<\/tr>\n
34<\/td>\n8.4 Interaction view
8.4.1 General
8.4.2 Privacy settings layer <\/td>\n<\/tr>\n
35<\/td>\n8.4.3 Identity and access management layer
8.4.4 PII layer <\/td>\n<\/tr>\n
37<\/td>\nAnnex A (informative) Examples of the PII-related concerns of an ICT system <\/td>\n<\/tr>\n
42<\/td>\nAnnex B (informative) A PII aggregation system with secure computation <\/td>\n<\/tr>\n
49<\/td>\nAnnex C (informative) A privacy-friendly, pseudonymous system for identity and access control management <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information technology. Security techniques. Privacy architecture framework<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2022<\/td>\n58<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":394779,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-394771","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/394771","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/394779"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=394771"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=394771"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=394771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}