{"id":425073,"date":"2024-10-20T06:54:52","date_gmt":"2024-10-20T06:54:52","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-275552021-2\/"},"modified":"2024-10-26T13:01:30","modified_gmt":"2024-10-26T13:01:30","slug":"bs-iso-iec-275552021-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-275552021-2\/","title":{"rendered":"BS ISO\/IEC 27555:2021"},"content":{"rendered":"
This document contains guidelines for developing and establishing policies and procedures for deletion of personally identifiable information (PII) in organizations by specifying:<\/p>\n
a harmonized terminology for PII deletion;<\/p>\n<\/li>\n
an approach for defining deletion rules in an efficient way;<\/p>\n<\/li>\n
a description of required documentation;<\/p>\n<\/li>\n
a broad definition of roles, responsibilities and processes.<\/p>\n<\/li>\n<\/ul>\n
This document is intended to be used by organizations where PII is stored or processed.<\/p>\n
This document does not address:<\/p>\n
specific legal provision, as given by national law or specified in contracts;<\/p>\n<\/li>\n
specific deletion rules for particular clusters of PII that are defined by PII controllers for processing PII;<\/p>\n<\/li>\n
deletion mechanisms;<\/p>\n<\/li>\n
reliability, security and suitability of deletion mechanisms;<\/p>\n<\/li>\n
specific techniques for de-identification of data.<\/p>\n<\/li>\n<\/ul>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4 Symbols and abbreviated terms 5 Framework for deletion 5.1 General <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5.2 Constraints 5.3 Clusters of PII <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.4 Retention period and regular deletion period 5.4.1 Retention period 5.4.2 Regular deletion period <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.4.3 Allocation of clusters of PII 5.5 Archives and backup copies 5.6 Standard deletion periods, starting points, deletion rules and deletion classes <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.7 Special situations 5.8 Documentation of policies and procedures <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6 Clusters of PII 6.1 General <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.2 Identification 6.3 Documentation <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7 Specification of deletion periods 7.1 Standard and regular deletion periods 7.2 Regular deletion period specifications <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 7.3 Standard deletion period identification <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 7.4 Deletion period specifications for special situations 7.4.1 General 7.4.2 Modification of data objects 7.4.3 Need to extend period of active use <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 7.4.4 Suspension of the deletion 7.4.5 Backup copies <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 8 Deletion classes 8.1 Abstract starting points \u2014 abstract deletion rules 8.2 Matrix of deletion classes <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 8.3 Allocation of deletion classes and definition of deletion rules <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 9 Requirements for implementation 9.1 General <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 9.2 Conditions for starting points outside IT systems 9.3 Requirements for implementation for organization-wide aspects 9.3.1 General 9.3.2 Backup <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 9.3.3 Logs 9.3.4 Transmission systems 9.3.5 Repair, dismantling and disposal of systems and components 9.3.6 Everyday business life <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 9.4 Requirements for implementation for individual IT systems <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 9.5 Deletion in regular manual processes 9.6 Requirements for implementation for PII processor 9.7 Control deletion in special cases 9.7.1 Exception management <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 9.7.2 Further sets of PII 10 Responsibilities 10.1 General <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 10.2 Documentation <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 10.3 Implementation <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information security, cybersecurity and privacy protection. Guidelines on personally identifiable information deletion<\/b><\/p>\n |