Information technology — Security techniques — Privacy engineering for system life cycle processes
This document provides privacy engineering guidelines that are intended to help organizations integrate recent advances in privacy engineering into system life cycle processes. It describes:
— the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management); and
— privacy engineering activities in key engineering…
Information technology - Security techniques - Privacy engineering for system life cycle processes
This document provides privacy engineering guidelines that are intended to help organizations integrate recent advances in privacy engineering into system life cycle processes. It describes:
— the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management); and
— privacy engineering activities in key engineering…
Information technology for learning, education and training — Learning analytics interoperability — ...
This document specifies privacy and data protection requirements and attributes to inform design of learning analytics systems and learning analytics practices in schools, universities, workplace learning and blended learning settings.
Information technology for learning, education and training - Learning analytics interoperability - ...
This document specifies privacy and data protection requirements and attributes to inform design of learning analytics systems and learning analytics practices in schools, universities, workplace learning and blended learning settings.
Health informatics — Information security management for remote maintenance of medical devices and m...
This document focuses on remote maintenance services (RMS) for information systems in healthcare facilities (HCFs) as provided by vendors of medical devices and health information systems.
This document specifies the risk assessment necessary to protect remote maintenance activities, taking into consideration the special characteristics of the healthcare field such as patient safety, regulations…
Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information managemen...
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.
This document specifies PIMS-related requirements and provides guidance for PII controllers and…
Security techniques - Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information managemen...
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.
This document specifies PIMS-related requirements and provides guidance for PII controllers and…
Information technology — Multimedia application format (MPEG-A) — Part 21: Visual identity managemen...
This document specifies the standard representation of the set of signalling and data used in the process of preserving privacy for storage sharing image/video.
Information technology - Multimedia application format (MPEG-A) - Part 21: Visual identity managemen...
This document specifies the standard representation of the set of signalling and data used in the process of preserving privacy for storage sharing image/video.
1 Scope
This document aims to normalize privacy-enhancing protocols and services by
— using the mechanisms from parts of ISO/IEC 7816 and parts of ISO/IEC 18328 that contribute to security and privacy,
— providing discoverability means of privacy-enabling attributes,
— defining requirements for attribute-based credential handling, and
— identifying data objects and commands for ICCs.…