BS ISO IEC 15944-8-2012 Information technology Business Operational View Identification of privacy protection requirements as external constraints on business transactions.pdf
《BS ISO IEC 15944-8-2012 Information technology Business Operational View Identification of privacy protection requirements as external constraints on business transactions.pdf》由会员分享,可在线阅读,更多相关《BS ISO IEC 15944-8-2012 Information technology Business Operational View Identification of privacy protection requirements as external constraints on business transactions.pdf(244页珍藏版)》请在麦多课文档分享上搜索。
1、raising standards worldwide NO COPYING WITHOUT BSI PERMISSION EXCEPT AS PERMITTED BY COPYRIGHT LAW BSI Standards Publication BS ISO/IEC 15944-8:2012 Information technology Business Operational View Part 8: Identification of privacy protection requirements as external constraints on business transact
2、ions BS ISO/IEC 15944-8:2012 BRITISH STANDARD National foreword This British Standard is the UK implementation of ISO/IEC 15944-8:2012. The UK participation in its preparation was entrusted to Technical Committee IST/40, Data management and interchange. A list of organizations represented on this co
3、mmittee can be obtained on request to its secretary. This publication does not purport to include all the necessary provisions of a contract. Users are responsible for its correct application. The British Standards Institution 2012. Published by BSI Standards Limited 2012 ISBN 978 0 580 62616 6 ICS
4、35.240.60 Compliance with a British Standard cannot confer immunity from legal obligations. This British Standard was published under the authority of the Standards Policy and Strategy Committee on 30 April 2012. Amendments issued since publication Date Text affectedBS ISO/IEC 15944-8:2012 Reference
5、 number ISO/IEC 15944-8:2012(E) ISO/IEC 2012 INTERNATIONAL STANDARD ISO/IEC 15944-8 First edition 2012-04-01 Information technology Business Operational View Part 8: Identification of privacy protection requirements as external constraints on business transactions Technologies de linformation Vue op
6、rationnelle daffaires Partie 8: Identification des exigences de protection de la vie prive en tant que contraintes externes sur les transactions daffaires BS ISO/IEC 15944-8:2012 ISO/IEC 15944-8:2012(E) COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2012 All rights reserved. Unless otherwise specified, no par
7、t of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Case postale 5
8、6 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail copyrightiso.org Web www.iso.org Published in Switzerland ii ISO/IEC 2012 All rights reservedBS ISO/IEC 15944-8:2012 ISO/IEC 15944-8:2012(E) ISO/IEC 2012 All rights reserved iiiContents Page Foreword . vii 0 Introduction . viii
9、0.1 Purpose and overview . viii 0.1.1 ISO/IEC 14662 “Open-edi Reference Model“ . viii 0.1.2 ISO/IEC 15944-1 “Business Agreement Semantic Descriptive Techniques” (“Business Operational View (BOV”) . x 0.2 Introducing the use of “Person“, “organization“ and “party“ in the context of business transacti
10、on and commitment exchange . xi 0.3 Importance and role of terms and definitions . xiii 0.4 Importance of the two classes of constraints of the Business Transaction Model (BTM) . xiii 0.5 Need for a standard based on rules and guidelines . xiv 0.6 Use of “jurisdictional domain“, and “jurisdiction“ (
11、and “country“) in the context of business transaction and commitment exchange . xv 0.7 Use of “identifier“ as “identifier (in business transaction)“ to prevent ambiguity xvi 0.8 Use of “privacy protection” in the context of business transaction and commitment exchange . xvi 0.9 Organization and desc
12、ription of this document xvii 1 Scope 1 1.1 Statement of scope . 1 1.2 Exclusions 2 1.2.1 Functional Services View (FSV) . 2 1.2.2 Internal behaviour of organizations (and public administration) . 2 1.2.3 “organization Person” 2 1.2.4 Overlap of and/or conflict among jurisdictional domains as source
13、s of privacy protection requirements 2 1.2.5 Publicly available personal information 3 1.3 Aspects currently not addressed 4 1.4 IT-systems environment neutrality 7 2 Normative references 9 2.1 ISO/IEC, ISO and ITU . 9 2.2 Referenced specifications 10 3 Terms and definitions . 11 4 Symbols and abbre
14、viations 41 5 Fundamental principles and assumptions governing privacy protection requirements in business transactions involving individuals (external constraints perspective) . 43 5.1 Introduction 43 5.2 Exceptions to the application of the privacy protection principles . 46 5.3 Fundamental Privac
15、y Protection Principles . 46 5.3.1 Privacy Protection Principle 1: Preventing Harm 46 5.3.2 Privacy Protection Principle 2: Accountability 47 5.3.3 Privacy Protection Principle 3: Identifying Purposes 50 5.3.4 Privacy Protection Principle 4: Informed Consent 50 5.3.5 Privacy Protection Principle 5:
16、Limiting Collection . 52 5.3.6 Privacy Protection Principle 6: Limiting Use, Disclosure and Retention 54 5.3.7 Privacy Protection Principle 7: Accuracy . 57 5.3.8 Privacy Protection Principle 8: Safeguards 58 5.3.9 Privacy Protection Principle 9: Openness 59 5.3.10 Principle Protection Principle 10:
17、 Individual Access 60 5.3.11 Privacy Protection Principle 11: Challenging Compliance . 62 BS ISO/IEC 15944-8:2012 ISO/IEC 15944-8:2012(E) iv ISO/IEC 2012 All rights reserved5.4 Requirement for tagging (or labelling) data elements in support of privacy protection requirements 63 6 Collaboration space
18、 and privacy protection .65 6.1 Introduction 65 6.2 Basic Open-edi collaboration space: Buyer and seller .65 6.3 Collaboration space: The role of buyer (as individual), seller and regulator 66 7 Public policy requirements of jurisdictional domains .69 7.1 Introduction 69 7.2 Jurisdictional domains a
19、nd public policy requirements .69 7.2.1 Privacy protection70 7.2.2 Person and external constraints: Consumer protection .72 7.2.3 Individual accessibility 73 7.2.4 Human rights 74 7.2.5 Privacy as a right of an “individual” and not the right of an organization or public administration 74 8 Principle
20、s and rules governing the establishment, management and use of identities of an individual .77 8.1 Introduction 77 8.2 Rules governing the establishment of personae, identifiers and signatures of an individual 78 8.3 Rules governing the assignment of unique identifiers to an individual by Registrati
21、on Authorities (RAs) .84 8.4 Rules governing individual identity, authentication, recognition, and use .85 8.5 Legally recognized individual identifies (LRIIs) .90 9 Person component individual sub-type .93 9.1 Introduction 93 9.2 Role qualification of a Person as an individual 93 9.3 Persona and le
22、gally recognized names (LRNs) of an individual 94 9.4 Truncation of legally recognized names of individuals .94 9.5 Rules governing anonymization of individuals in a business transaction .95 9.6 Rules governing pseudonymization of personal information in a business transaction 97 10 Process componen
23、t 99 10.1 Introduction 99 10.2 Planning 99 10.3 Identification .99 10.4 Negotiation 100 10.5 Actualization 100 10.6 Post-Actualization . 100 11 Data component 101 11.1 Introduction . 101 11.2 Rules governing the role of Business Transaction Identifier (BTI) in support of privacy protection requireme
24、nts 101 11.3 Rules governing state of change management of business transactions in support of privacy protection requirements . 102 11.4 Rules governing records retention of personal information in a business transaction . 102 11.5 Rules governing time/date referencing of personal information in a
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BSISOIEC1594482012INFORMATIONTECHNOLOGYBUSINESSOPERATIONALVIEWIDENTIFICATIONOFPRIVACYPROTECTIONREQUIREMENTSASEXTERNALCONSTRAINTSONBUSINESSTRANSACTIONSPDF

链接地址:http://www.mydoc123.com/p-396401.html