{"id":394771,"date":"2024-10-20T04:15:40","date_gmt":"2024-10-20T04:15:40","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iso-iec-291012021\/"},"modified":"2024-10-26T07:58:27","modified_gmt":"2024-10-26T07:58:27","slug":"bs-en-iso-iec-291012021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iso-iec-291012021\/","title":{"rendered":"BS EN ISO\/IEC 29101:2021"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | European foreword Endorsement notice <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions 4 Symbols and abbreviated terms 5 Overview of the privacy architecture framework 5.1 Elements of the framework <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.2 Relationship with management systems 6 Actors and PII 6.1 Overview <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6.2 Phases of the PII processing life cycle 6.2.1 Collection <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.2.2 Transfer 6.2.3 Use <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.2.4 Storage 6.2.5 Disposal 7 Concerns 7.1 Overview 7.2 The privacy principles of ISO\/IEC 29100 <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 7.3 Privacy safeguarding requirements 8 Architectural views 8.1 General <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 8.2 Component view 8.2.1 General <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 8.2.2 Privacy settings layer <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 8.2.3 Identity management and access management layer <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 8.2.4 PII layer <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 8.3 Actor view 8.3.1 General <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 8.3.2 ICT system of the PII principal 8.3.3 ICT system of the PII controller <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 8.3.4 ICT system of the PII processor <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 8.4 Interaction view 8.4.1 General 8.4.2 Privacy settings layer <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 8.4.3 Identity and access management layer 8.4.4 PII layer <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | Annex A (informative) Examples of the PII-related concerns of an ICT system <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | Annex B (informative) A PII aggregation system with secure computation <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | Annex C (informative) A privacy-friendly, pseudonymous system for identity and access control management <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Security techniques. Privacy architecture framework<\/b><\/p>\n |