Informationstechnik - Betrachtung des operativen Geschäfts - Teil 8: Identifikation von Vertraulichkeitsanforderungen als externe Beschränkungen bei Geschäftsvorgängen Information technology - Business Operational View - Part 8: Identification of privacy protection requirements as external constraints on business transactions
Informationstechnik - Betrachtung des operativen Geschäfts - Teil 8: Identifikation von Vertraulichkeitsanforderungen als externe Beschränkungen bei GeschäftsvorgängenInformation technology - Business Operational View - Part 8: Identification of privacy protection requirements as external constraints on business transactions |
Shortname | ISO/IEC 15944-8:2012-04 |
---|---|
Dokumentnummer | 15944-8 |
Ausgabedatum | 2012-04-00 |
Erwerb bei | https://www.vde-verlag.de/iec-normen/218780/iso-iec-15944-8-2012.html |
Internationales Gremium | ISO/IEC JTC 1/SC 32 |
Fachgebiet | Normung, Kommunikation, Dokumentation |
Thema | Betrachtung des operativen Geschäfts |
Sektor | Informationstechnik und Telekommunikation |
Branche | Informationstechnik |
- Einführungsbeitrag (short) EN:
ISO/IEC 15944-8:2012 has been developed to support modelling generic international requirements for identifying and providing privacy protection of personal information throughout any kind of information and communications technology (ICT) based business transaction where the individual has the role of a buyer. It provides users and designers with a methodology and tools addressing requirements imposed by jurisdictional domains. ISO/IEC 15944-8:2012 takes the "business operational view" (BOV) aspects developed in ISO/IEC 14662, together with, in particular, ISO/IEC 15944-1 and ISO/IEC 15944-5 as well as many other international references. ISO/IEC 15944 models the requirements of jurisdictional domains as external constraints upon the creation, use, interchange, and information life-cycle management of data. ISO/IEC 15944-8:2012 addresses the wider context of the public policy requirements of jurisdictional domains controlling the use of personal information (PI). These include regulations for consumer protection, privacy protection, individual accessibility, etc. ISO/IEC 15944-8:2012 identifies and expands upon eleven generic, primitive, international principles that have been associated with privacy protection by international, regional, and UN member states' requirements. It models them with respect to the "collaboration space" of a business transaction and commitment exchange involving an individual acting in the role of a "buyer". It provides principles and rules governing the establishment, management and use of identifiers of that individual, including the use of legally recognized names (LRNs), recognized individual identity (rii), and methods of non-identification such as the use of anonymization and pseudonymization of personal information. ISO/IEC 15944-8:2012 also sets out principles governing information life-cycle management (ILCM) as well as the rules and associated coded domains for obtaining informed consent for collection, specifying state changes, records retention, record deletion and related matters in support of privacy protection requirements.
- Anmerkung:
Eingeschränkter sachlicher Geltungsbereich in Abschnitt 1 (Scope).
- 95/46/EG (1995-10-24)
- ISO 1087-1 (2000-10)
- ISO 19108 (2002-09)
- ISO 22857 (2004-04)
- ISO 3166-1 (2006-11)
- ISO 3166-2 (2007-12)
- ISO 5127 (2001-10)
- ISO 639-2 (1998-11)
- ISO 8601 (2004-12)
- ISO/IEC 14662 (2010-02)
- ISO/IEC 15944-1 (2011-08)
- ISO/IEC 15944-2 (2006-07)
- ISO/IEC 15944-4 (2007-11)
- ISO/IEC 15944-5 (2008-06)
- ISO/IEC 15944-7 (2009-11)
- ISO/IEC 19501 (2005-04)
- ISO/IEC 2382-1 (1993-11)
- ISO/IEC 2382-13 (1996-06)
- ISO/IEC 2382-14 (1997-12)
- ISO/IEC 2382-15 (1999-06)
- ISO/IEC 2382-16 (1996-10)
- ISO/IEC 2382-17 (1999-07)
- ISO/IEC 2382-18 (1999-11)
- ISO/IEC 2382-20 (1990-03)
- ISO/IEC 2382-23 (1994-03)
- ISO/IEC 2382-24 (1995-12)
- ISO/IEC 2382-25 (1992-04)
- ISO/IEC 2382-26 (1993-12)
- ISO/IEC 2382-27 (1994-12)
- ISO/IEC 2382-28 (1995-12)
- ISO/IEC 2382-29 (1999-08)
- ISO/IEC 2382-31 (1997-12)
- ISO/IEC 2382-32 (1999-02)
- ISO/IEC 2382-34 (1999-08)
- ISO/IEC 2382-36 (2008-05)
- ISO/IEC 2382-4 (1999-11)
- ISO/IEC 2382-5 (1999-11)
- ISO/IEC 2382-7 (2000-04)
- ISO/IEC 2382-8 (1998-11)
- ISO/IEC 2382-9 (1995-11)
- ISO/IEC 5218 (2004-07)
- ISO/IEC 6523-1 (1998-12)
- ISO/IEC 6523-2 (1998-12)
- ISO/IEC 7501-1 (2008-09)
- ISO/IEC 7501-2 (1997-08)
- ISO/IEC 7501-3 (2005-10)
- ISO/IEC 7812-1 (2006-10)
- ISO/IEC 7812-2 (2007-05)
-
Thüringen Branche: Informationstechnik
Ergebnis 41Thüringer DatenschutzgesetzThürDSG
Einzelne Vorschriften
§§ 4; 16-19; 23; 25-30; 33-39; 48; 49; 52; 54; 57-60
Thüringen Branche: Informationstechnik
Ergebnis 42Allgemeine Richtlinie zur Nutzung des zentralen Internetzuganges, des Mailsystems und der zentralen IP-TK-Vermittlung des Corporate Network (CN) des FreistaatsThüringenIntzugIP-TKVermCNRichtl
Einzelne Vorschriften
Punkte 2; 4
Thüringen Branche: Informationstechnik
Ergebnis 43Richtlinie für Verkabelungen zum Aufbau von dienstneutralen Kommunikationsanlagen des Freistaates Thüringen - Verkabelungsrichtlinie 2010VerkblRichtl2010
Einzelne Vorschriften
Punkte 4; 5; 6
Transnational Branche: Informationstechnik
Ergebnis 44VERORDNUNG (EU) 2019/881 DES EUROPÄISCHEN PARLAMENTS UND DES RATES vom 17. April 2019 über die ENISA (Agentur der Europäischen Union für Cybersicherheit) und über die Zertifizierung der Cybersicherheit von Informations- und Kommunikationstechnik und zur Aufhebung der Verordnung (EU) Nr. 526/2013 (Rechtsakt zur Cybersicherheit)VO Nr. 881/2019 (EU) - EU Cybersecurity Act
Einzelne Vorschriften
Alle
Bundesrecht Branche: Informationstechnik
Ergebnis 45IT Sicherheitsgesetz 2.0IT SiG 2.0
Einzelne Vorschriften
Alle