{"id":230913,"date":"2024-10-19T15:01:49","date_gmt":"2024-10-19T15:01:49","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-cen-tr-167422014\/"},"modified":"2024-10-25T09:18:45","modified_gmt":"2024-10-25T09:18:45","slug":"bsi-pd-cen-tr-167422014","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-cen-tr-167422014\/","title":{"rendered":"BSI PD CEN\/TR 16742:2014"},"content":{"rendered":"
This Technical Report gives general guidelines to developers of intelligent transport systems (ITS) and its standards on data privacy aspects and associated legislative requirements. It is based on the EU-Directives valid at the end of 2013. It is expected that planned future enhancements of the Directives and the proposed \u201cGeneral Data Protection Regulation\u201d including the Report of the EU-Parliament of 2013-11-22 (P7_A(2013)0402) will not change the guide significantly.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
5<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | 1 Scope 2 Terms and definitions <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 3 Symbols and abbreviated terms <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Background information 4.1 Historical background <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4.2 Legal background <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 4.3 Fundamental Rights of Data Protection and Privacy <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5 Basic elements of data protection and privacy 5.1 Personal information (PI) and its avoidance 5.1.1 General Figure 1 \u2014 Personal Information related to a person by personal characteristics <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | Figure 2 \u2014 Personal Information related to behaviour of a person <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.1.2 GPS-Data or GPS-Trajectories <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | Figure 3 \u2014 Vienna St. Stephan Cathedral Entrance and GPS-ellipses (deleted 1 and 2 decimal places) 5.2 Sensitive data 5.3 Individual or data subject <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.4 Controller 5.4.1 General 5.4.2 ITS environment <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.5 Processor <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 5.6 Third Party 5.7 File or filing system (manually or automatically processed) 5.8 Consent <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 5.9 Withdrawal of consent 5.10 Fairness and legitimacy 5.11 Determination of purpose <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 5.12 Minimization of PI 5.13 Topicality and correctness of PI <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 5.14 Time limits to PI 5.15 Security requirements to PI <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 5.16 Obligation to keep PI secret 5.17 Obligation to inform the data subject (Individual or legal entity) <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 5.18 Right (access) to PI <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 5.19 Right to rectification and erasure of PI <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 5.20 Right to objection <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 5.21 Video surveillance (VS) 5.22 Shift in the burden of proof <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Annex A (informative) Examples of the principle of \u201ccumulative interpretation\u201d <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Annex B (informative) Data privacy Framework, Directives and Guidelines <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | Annex C (informative) Security related International Standards <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Intelligent transport systems. Privacy aspects in ITS standards and systems in Europe<\/b><\/p>\n |