INCITS/ISO/IEC 20889:2018 (2019)
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Privacy enhancing data de-identification terminology and classification of techniques
Hardcopy , PDF
English
04-12-2019
29-11-2024
This document provides a description of privacy-enhancing data de-identification techniques, to be used to describe and design de-identification measures in accordance with the privacy principles in ISO/IEC 29100.
| Committee |
ISO/IEC JTC 1
|
| DocumentType |
Standard
|
| Pages |
0
|
| PublisherName |
Information Technology Industry Council
|
| Status |
Superseded
|
| SupersededBy |
| Standards | Relationship |
| ISO/IEC 20889:2018 | Identical |
| ISO 25237:2017 | Health informatics — Pseudonymization |
| ISO/IEC 11770-3:2008 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques |
| ISO/IEC 27000:2018 | Information technology — Security techniques — Information security management systems — Overview and vocabulary |
| ISO/IEC 29134:2017 | Information technology — Security techniques — Guidelines for privacy impact assessment |
| ISO/IEC 10118-3:2018 | IT Security techniques — Hash-functions — Part 3: Dedicated hash-functions |
| ISO/IEC 19944:2017 | Information technology — Cloud computing — Cloud services and devices: Data flow, data categories and data use |
| ISO/IEC 9797-2:2011 | Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function |
| ISO/IEC 11770-1:2010 | Information technology — Security techniques — Key management — Part 1: Framework |
| ISO/IEC 29101:2018 | Information technology — Security techniques — Privacy architecture framework |
| ISO/IEC 27038:2014 | Information technology — Security techniques — Specification for digital redaction |
| ISO/IEC 19592-2:2017 | Information technology — Security techniques — Secret sharing — Part 2: Fundamental mechanisms |
| ISO/IEC 29100:2011 | Information technology — Security techniques — Privacy framework |
| ISO 31000:2018 | Risk management — Guidelines |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.