{"id":460266,"date":"2024-10-20T10:08:45","date_gmt":"2024-10-20T10:08:45","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-275612024\/"},"modified":"2024-10-26T18:45:17","modified_gmt":"2024-10-26T18:45:17","slug":"bs-iso-iec-275612024","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-275612024\/","title":{"rendered":"BS ISO\/IEC 27561:2024"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 4 Symbols and abbreviated terms 5 Context of privacy operationalization 5.1 General 5.2 Privacy engineering viewpoint <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.3 Privacy engineering operationalization model 5.4 Privacy engineering operationalization method 5.5 POMME processes overview <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.6 Privacy and security <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6 Initial information inventory process 6.1 Purpose 6.2 Outcomes 6.3 Define and describe the TOA <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6.4 Participant and information source identification 6.5 Systems and processes identification 6.6 Domains and domain owners identification <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 6.7 Intra-domain roles and responsibilities identification 6.8 Touch points identification 6.9 Data flows identification 6.10 PII identification <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 7 Privacy controls, privacy control requirements, capabilities, risk assessment and iteration process 7.1 Purpose 7.2 Outcomes <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 7.3 Privacy control specification 7.4 Privacy control requirement specification 7.5 Capabilities specification <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 7.6 Risk assessment 7.7 Iteration <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 8 Privacy capabilities 8.1 Capabilities overview <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 8.2 Capability details and associated functions 8.2.1 Core policy capabilities <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 8.2.2 Privacy assurance capabilities 8.2.3 Presentation and lifecycle capabilities <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Annex A (informative) Mapping of the privacy principles from ISO\/IEC 29100 to POMME capabilities <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Annex B (informative) Lifecycle process example involving a PII controller and a solution provider <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | Annex C (informative) POMME capability functions and mechanisms in a consumer application use case <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information security, cybersecurity and privacy protection. Privacy operationalisation model and method for engineering (POMME)<\/b><\/p>\n |