Informationstechnik - Betrachtung des operativen Geschäfts - Teil 8: Identifikation von Vertraulichkeitsanforderungen als externe Beschränkungen bei Geschäftsvorgängen Information technology - Business Operational View - Part 8: Identification of privacy protection requirements as external constraints on business transactions
Informationstechnik - Betrachtung des operativen Geschäfts - Teil 8: Identifikation von Vertraulichkeitsanforderungen als externe Beschränkungen bei GeschäftsvorgängenInformation technology - Business Operational View - Part 8: Identification of privacy protection requirements as external constraints on business transactions |
Shortname | ISO/IEC 15944-8:2012-04 |
---|---|
Dokumentnummer | 15944-8 |
Ausgabedatum | 2012-04-00 |
Erwerb bei | https://www.vde-verlag.de/iec-normen/218780/iso-iec-15944-8-2012.html |
Internationales Gremium | ISO/IEC JTC 1/SC 32 |
Fachgebiet | Normung, Kommunikation, Dokumentation |
Thema | Betrachtung des operativen Geschäfts |
Sektor | Informationstechnik und Telekommunikation |
Branche | Informationstechnik |
- Einführungsbeitrag (short) EN:
ISO/IEC 15944-8:2012 has been developed to support modelling generic international requirements for identifying and providing privacy protection of personal information throughout any kind of information and communications technology (ICT) based business transaction where the individual has the role of a buyer. It provides users and designers with a methodology and tools addressing requirements imposed by jurisdictional domains. ISO/IEC 15944-8:2012 takes the "business operational view" (BOV) aspects developed in ISO/IEC 14662, together with, in particular, ISO/IEC 15944-1 and ISO/IEC 15944-5 as well as many other international references. ISO/IEC 15944 models the requirements of jurisdictional domains as external constraints upon the creation, use, interchange, and information life-cycle management of data. ISO/IEC 15944-8:2012 addresses the wider context of the public policy requirements of jurisdictional domains controlling the use of personal information (PI). These include regulations for consumer protection, privacy protection, individual accessibility, etc. ISO/IEC 15944-8:2012 identifies and expands upon eleven generic, primitive, international principles that have been associated with privacy protection by international, regional, and UN member states' requirements. It models them with respect to the "collaboration space" of a business transaction and commitment exchange involving an individual acting in the role of a "buyer". It provides principles and rules governing the establishment, management and use of identifiers of that individual, including the use of legally recognized names (LRNs), recognized individual identity (rii), and methods of non-identification such as the use of anonymization and pseudonymization of personal information. ISO/IEC 15944-8:2012 also sets out principles governing information life-cycle management (ILCM) as well as the rules and associated coded domains for obtaining informed consent for collection, specifying state changes, records retention, record deletion and related matters in support of privacy protection requirements.
- Anmerkung:
Eingeschränkter sachlicher Geltungsbereich in Abschnitt 1 (Scope).
- 95/46/EG (1995-10-24)
- ISO 1087-1 (2000-10)
- ISO 19108 (2002-09)
- ISO 22857 (2004-04)
- ISO 3166-1 (2006-11)
- ISO 3166-2 (2007-12)
- ISO 5127 (2001-10)
- ISO 639-2 (1998-11)
- ISO 8601 (2004-12)
- ISO/IEC 14662 (2010-02)
- ISO/IEC 15944-1 (2011-08)
- ISO/IEC 15944-2 (2006-07)
- ISO/IEC 15944-4 (2007-11)
- ISO/IEC 15944-5 (2008-06)
- ISO/IEC 15944-7 (2009-11)
- ISO/IEC 19501 (2005-04)
- ISO/IEC 2382-1 (1993-11)
- ISO/IEC 2382-13 (1996-06)
- ISO/IEC 2382-14 (1997-12)
- ISO/IEC 2382-15 (1999-06)
- ISO/IEC 2382-16 (1996-10)
- ISO/IEC 2382-17 (1999-07)
- ISO/IEC 2382-18 (1999-11)
- ISO/IEC 2382-20 (1990-03)
- ISO/IEC 2382-23 (1994-03)
- ISO/IEC 2382-24 (1995-12)
- ISO/IEC 2382-25 (1992-04)
- ISO/IEC 2382-26 (1993-12)
- ISO/IEC 2382-27 (1994-12)
- ISO/IEC 2382-28 (1995-12)
- ISO/IEC 2382-29 (1999-08)
- ISO/IEC 2382-31 (1997-12)
- ISO/IEC 2382-32 (1999-02)
- ISO/IEC 2382-34 (1999-08)
- ISO/IEC 2382-36 (2008-05)
- ISO/IEC 2382-4 (1999-11)
- ISO/IEC 2382-5 (1999-11)
- ISO/IEC 2382-7 (2000-04)
- ISO/IEC 2382-8 (1998-11)
- ISO/IEC 2382-9 (1995-11)
- ISO/IEC 5218 (2004-07)
- ISO/IEC 6523-1 (1998-12)
- ISO/IEC 6523-2 (1998-12)
- ISO/IEC 7501-1 (2008-09)
- ISO/IEC 7501-2 (1997-08)
- ISO/IEC 7501-3 (2005-10)
- ISO/IEC 7812-1 (2006-10)
- ISO/IEC 7812-2 (2007-05)
-
Transnational Branche: Informationstechnik
Ergebnis 51Verordnung (EU) 2019/796 DES RATES vom 17. Mai 2019 über restriktive Maßnahmen gegen Cyberangriffe, die die Union oder ihre Mitgliedstaaten bedrohenVO (EU) 2019/796
Einzelne Vorschriften
Alle
Saarland Branche: Informationstechnik
Ergebnis 52Informationssicherheitsgesetz SaarlandIT-SiG SL
Einzelne Vorschriften
§§ 4-8
Bundesrecht Branche: Informationstechnik
Ergebnis 53Verordnung über Sicherheit und Gesundheitsschutz bei der Verwendung von ArbeitsmittelnBetrSichV
Einzelne Vorschriften
§§ 3, 5, 6, 14, 16, 17
Rundschreiben / Verwaltungsanweisungen / Strategien Branche: Informationstechnik
Ergebnis 54The EU's Cybersecurity Strategy for the Digital DecadeEUCyberStr
Einzelne Vorschriften
Alle
Rundschreiben / Verwaltungsanweisungen / Strategien Branche: Informationstechnik
Ergebnis 55Cyber-Sicherheits-Strategie für DeutschlandDECyberStr
Einzelne Vorschriften
Alle