{"id":460320,"date":"2024-10-20T10:09:05","date_gmt":"2024-10-20T10:09:05","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-15944-172024\/"},"modified":"2024-10-26T18:46:07","modified_gmt":"2024-10-26T18:46:07","slug":"bs-iso-iec-15944-172024","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-15944-172024\/","title":{"rendered":"BS ISO\/IEC 15944-17:2024"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 4 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 5 Fundamental privacy protection principles 5.1 Overview <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 5.2 Primary sources of privacy protection principles 5.3 Exceptions to the application of the privacy protection principles 5.4 Key eleven (11) privacy protection principles <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 5.5 Link to \u201cconsumer protection\u201d and \u201cindividual accessibility\u201d requirements <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 5.6 Requirements for tagging (or labelling) sets of personal information (SPIs) in support of privacy protection requirements (PPR) 5.7 Requirements for making all personal information (PI) available to the buyer where the buyer is an individual 6 Fundamental principles and rules governing Privacy by Design (PbD) requirements 6.1 Overview <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 6.2 Fundamental principles of Privacy by Design 6.2.1 Privacy by Design Principle 1: Proactive not reactive; preventative not remedial 6.2.2 Privacy by Design Principle 2: Privacy as the Default Setting <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 6.2.3 Privacy by Design Principle 3: Privacy Embedded into Design <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 6.2.4 Privacy by Design Principle 4: Full Functionality \u2014 Positive-Sum, not Zero-Sum 6.2.5 Privacy by Design Principle 5: End-to-End Safeguards \u2014 Full Information Management Life Cycle (ILCM) Protection <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 6.2.6 Privacy by Design Principle 6: Visibility and Transparency \u2014 Keep it Open 6.2.7 Privacy by Design Principle 7: Respect for User Privacy \u2014 Keep it User-Centric <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 6.3 Exceptions to the application of any of the Privacy by Design principles 6.4 Mapping the eleven (11) Privacy Protection Principles (PPP) to the seven (7) Privacy by Design principles 7 Collaboration space and privacy protection 7.1 Overview <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 7.2 Collaboration space: Role of consumer (as individual), vendor and regulator <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 8 Ensuring that personal information is \u2018under the control of\u2019 the organization throughout its ILCM 8.1 Overview <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 8.2 Rules governing the specification of ILCM aspects of personal information 8.3 Implementing \u201cunder the control of\u201d and accountability <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 9 Conformance statement 9.1 Overview <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 9.2 Conformance to the ISO\/IEC 14662 Open-edi Reference Model and the multipart ISO\/IEC 15944 eBusiness standard 9.3 Conformance to ISO\/IEC 15944-17 9.4 Conformance by agents and third parties to ISO\/IEC 15944-17 <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | Annex A (normative) Consolidated controlled vocabulary definitions and associated terms, as human interface equivalents (HIEs), with cultural adaptability: English and French language equivalency in an IT standardization context <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | Annex B (normative) Consolidated set of rules in existing Parts of ISO\/IEC 15944 of particular relevance to PbD as external constraints on business transactions which apply to personal information (PI) in an EDI and collaboration space context <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | Annex C (informative) Mapping ISO\/IEC 15944-8 Privacy Protection Principles (PPP) to the Privacy by Design principles <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | Annex D (informative) Exclusions to the scope of ISO\/IEC 15944-17 <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | Annex E (informative) Fair Information Principles \/ Fair Information Practices <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | Annex F (informative) Aspects currently not addressed <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Business operational view – Fundamental principles and rules governing Privacy-by-Design (PbD) requirements in an EDI and collaboration space context<\/b><\/p>\n |