BS ISO IEC 15944-8-2012 Information technology Business Operational View Identification of privacy protection requirements as external constraints on business transactions《信息技术 商业运.pdf
《BS ISO IEC 15944-8-2012 Information technology Business Operational View Identification of privacy protection requirements as external constraints on business transactions《信息技术 商业运.pdf》由会员分享,可在线阅读,更多相关《BS ISO IEC 15944-8-2012 Information technology Business Operational View Identification of privacy protection requirements as external constraints on business transactions《信息技术 商业运.pdf(244页珍藏版)》请在麦多课文档分享上搜索。
1、raising standards worldwideNO COPYING WITHOUT BSI PERMISSION EXCEPT AS PERMITTED BY COPYRIGHT LAWBSI Standards PublicationBS ISO/IEC 15944-8:2012Information technology Business Operational View Part 8: Identification of privacy protection requirements as external constraints on business transactions
2、 BS ISO/IEC 15944-8:2012 BRITISH STANDARDNational forewordThis British Standard is the UK implementation of ISO/IEC 15944-8:2012.The UK participation in its preparation was entrusted to TechnicalCommittee IST/40, Data management and interchange.A list of organizations represented on this committee c
3、an be obtained on request to its secretary.This publication does not purport to include all the necessary provisions of a contract. Users are responsible for its correct application. The British Standards Institution 2012. Published by BSI Standards Limited 2012ISBN 978 0 580 62616 6 ICS 35.240.60 C
4、ompliance with a British Standard cannot confer immunity from legal obligations.This British Standard was published under the authority of the Standards Policy and Strategy Committee on 30 April 2012.Amendments issued since publicationDate Text affectedBS ISO/IEC 15944-8:2012Reference numberISO/IEC
5、15944-8:2012(E)ISO/IEC 2012INTERNATIONALSTANDARD ISO/IEC15944-8First edition2012-04-01Information technology BusinessOperational View Part 8: Identification of privacy protectionrequirements as external constraints onbusiness transactions Technologies de linformation Vue oprationnelle daffaires Part
6、ie 8: Identification des exigences de protection de la vie prive en tant que contraintes externes sur les transactions daffaires BS ISO/IEC 15944-8:2012ISO/IEC 15944-8:2012(E) COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2012 All rights reserved. Unless otherwise specified, no part of this publication may b
7、e reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. +
8、41 22 749 01 11 Fax + 41 22 749 09 47 E-mail copyrightiso.org Web www.iso.org Published in Switzerland ii ISO/IEC 2012 All rights reservedBS ISO/IEC 15944-8:2012ISO/IEC 15944-8:2012(E) ISO/IEC 2012 All rights reserved iiiContents Page Foreword . vii 0 Introduction . viii 0.1 Purpose and overview . v
9、iii 0.1.1 ISO/IEC 14662 “Open-edi Reference Model“ . viii 0.1.2 ISO/IEC 15944-1 “Business Agreement Semantic Descriptive Techniques” (“Business Operational View (BOV”) . x 0.2 Introducing the use of “Person“, “organization“ and “party“ in the context of business transaction and commitment exchange .
10、 xi 0.3 Importance and role of terms and definitions . xiii 0.4 Importance of the two classes of constraints of the Business Transaction Model (BTM) . xiii 0.5 Need for a standard based on rules and guidelines . xiv 0.6 Use of “jurisdictional domain“, and “jurisdiction“ (and “country“) in the contex
11、t of business transaction and commitment exchange . xv 0.7 Use of “identifier“ as “identifier (in business transaction)“ to prevent ambiguity xvi 0.8 Use of “privacy protection” in the context of business transaction and commitment exchange . xvi 0.9 Organization and description of this document xvi
12、i 1 Scope 1 1.1 Statement of scope . 1 1.2 Exclusions 2 1.2.1 Functional Services View (FSV) . 2 1.2.2 Internal behaviour of organizations (and public administration) . 2 1.2.3 “organization Person” 2 1.2.4 Overlap of and/or conflict among jurisdictional domains as sources of privacy protection requ
13、irements 2 1.2.5 Publicly available personal information 3 1.3 Aspects currently not addressed 4 1.4 IT-systems environment neutrality 7 2 Normative references 9 2.1 ISO/IEC, ISO and ITU . 9 2.2 Referenced specifications 10 3 Terms and definitions . 11 4 Symbols and abbreviations 41 5 Fundamental pr
14、inciples and assumptions governing privacy protection requirements in business transactions involving individuals (external constraints perspective) . 43 5.1 Introduction 43 5.2 Exceptions to the application of the privacy protection principles . 46 5.3 Fundamental Privacy Protection Principles . 46
15、 5.3.1 Privacy Protection Principle 1: Preventing Harm 46 5.3.2 Privacy Protection Principle 2: Accountability 47 5.3.3 Privacy Protection Principle 3: Identifying Purposes 50 5.3.4 Privacy Protection Principle 4: Informed Consent 50 5.3.5 Privacy Protection Principle 5: Limiting Collection . 52 5.3
16、.6 Privacy Protection Principle 6: Limiting Use, Disclosure and Retention 54 5.3.7 Privacy Protection Principle 7: Accuracy . 57 5.3.8 Privacy Protection Principle 8: Safeguards 58 5.3.9 Privacy Protection Principle 9: Openness 59 5.3.10 Principle Protection Principle 10: Individual Access 60 5.3.11
17、 Privacy Protection Principle 11: Challenging Compliance . 62 BS ISO/IEC 15944-8:2012ISO/IEC 15944-8:2012(E) iv ISO/IEC 2012 All rights reserved5.4 Requirement for tagging (or labelling) data elements in support of privacy protection requirements 63 6 Collaboration space and privacy protection .65 6
18、.1 Introduction 65 6.2 Basic Open-edi collaboration space: Buyer and seller .65 6.3 Collaboration space: The role of buyer (as individual), seller and regulator 66 7 Public policy requirements of jurisdictional domains .69 7.1 Introduction 69 7.2 Jurisdictional domains and public policy requirements
19、 .69 7.2.1 Privacy protection70 7.2.2 Person and external constraints: Consumer protection .72 7.2.3 Individual accessibility 73 7.2.4 Human rights 74 7.2.5 Privacy as a right of an “individual” and not the right of an organization or public administration 74 8 Principles and rules governing the est
20、ablishment, management and use of identities of an individual .77 8.1 Introduction 77 8.2 Rules governing the establishment of personae, identifiers and signatures of an individual 78 8.3 Rules governing the assignment of unique identifiers to an individual by Registration Authorities (RAs) .84 8.4
21、Rules governing individual identity, authentication, recognition, and use .85 8.5 Legally recognized individual identifies (LRIIs) .90 9 Person component individual sub-type .93 9.1 Introduction 93 9.2 Role qualification of a Person as an individual 93 9.3 Persona and legally recognized names (LRNs)
22、 of an individual 94 9.4 Truncation of legally recognized names of individuals .94 9.5 Rules governing anonymization of individuals in a business transaction .95 9.6 Rules governing pseudonymization of personal information in a business transaction 97 10 Process component 99 10.1 Introduction 99 10.
23、2 Planning 99 10.3 Identification .99 10.4 Negotiation 100 10.5 Actualization 100 10.6 Post-Actualization . 100 11 Data component 101 11.1 Introduction . 101 11.2 Rules governing the role of Business Transaction Identifier (BTI) in support of privacy protection requirements 101 11.3 Rules governing
24、state of change management of business transactions in support of privacy protection requirements . 102 11.4 Rules governing records retention of personal information in a business transaction . 102 11.5 Rules governing time/date referencing of personal information in a business transaction 103 12 T
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BSISOIEC1594482012INFORMATIONTECHNOLOGYBUSINESSOPERATIONALVIEWIDENTIFICATIONOFPRIVACYPROTECTIONREQUIREMENTSASEXTERNALCONSTRAINTSONBUSINESSTRANSACTIONS

链接地址:http://www.mydoc123.com/p-588318.html