ISO/IEC 15944-8:2012
Current
The latest, up-to-date edition.
Information technology — Business operational view — Part 8: Identification of privacy protection requirements as external constraints on business transactions
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
English
29-03-2012
ISO/IEC 15944-8:2012 has been developed to support modelling generic international requirements for identifying and providing privacy protection of personal information throughout any kind of information and communications technology (ICT) based business transaction where the individual has the role of a buyer. It provides users and designers with a methodology and tools addressing requirements imposed by jurisdictional domains.
ISO/IEC 15944-8:2012 takes the "business operational view" (BOV) aspects developed in ISO/IEC 14662, together with, in particular, ISO/IEC 15944-1 and ISO/IEC 15944-5 as well as many other international references.
ISO/IEC 15944 models the requirements of jurisdictional domains as external constraints upon the creation, use, interchange, and information life-cycle management of data. ISO/IEC 15944-8:2012 addresses the wider context of the public policy requirements of jurisdictional domains controlling the use of personal information (PI). These include regulations for consumer protection, privacy protection, individual accessibility, etc.
ISO/IEC 15944-8:2012 identifies and expands upon eleven generic, primitive, international principles that have been associated with privacy protection by international, regional, and UN member states' requirements. It models them with respect to the "collaboration space" of a business transaction and commitment exchange involving an individual acting in the role of a "buyer". It provides principles and rules governing the establishment, management and use of identifiers of that individual, including the use of legally recognized names (LRNs), recognized individual identity (rii), and methods of non-identification such as the use of anonymization and pseudonymization of personal information.
ISO/IEC 15944-8:2012 also sets out principles governing information life-cycle management (ILCM) as well as the rules and associated coded domains for obtaining informed consent for collection, specifying state changes, records retention, record deletion and related matters in support of privacy protection requirements.
Committee |
ISO/IEC JTC 1/SC 32
|
DocumentType |
Standard
|
Pages |
221
|
ProductNote |
THIS STANDARD ALSO REFERS TO ISO/IEC 2382, ISO/IEC 11179-1
|
PublisherName |
International Organization for Standardization
|
Status |
Current
|
Standards | Relationship |
CSA ISO/IEC 15944-8:15 (R2019) | Identical |
BS ISO/IEC 15944-8:2012 | Identical |
NEN ISO/IEC 15944-8 : 2012 | Identical |
CSA ISO/IEC 15944-8 : 2015 | Identical |
16/30313398 DC : 0 | BS ISO/IEC 15944-12 - INFORMATION TECHNOLOGY - BUSINESS OPERATIONAL VIEW - PART 12: PRIVACY PROTECTION REQUIREMENTS ON INFORMATION LIFE CYCLE MANAGEMENT (ILCM) AND EDI OF PERSONAL INFORMATION |
14/30298720 DC : 0 | BS ISO/IEC 15944-9 - INFORMATION TECHNOLOGY - BUSINESS OPERATIONAL VIEW - PART 9: BUSINESS TRANSACTION TRACEABILITY FRAMEWORK FOR COMMITMENT EXCHANGE |
BS ISO/IEC 15944-20:2015 | Information technology. Business Operational View Linking business operational view to functional service view |
ISO/IEC 15944-20:2015 | Information technology — Business operational view — Part 20: Linking business operational view to functional service view |
ISO/IEC 20016-1:2014 | Information technology for learning, education and training — Language accessibility and human interface equivalencies (HIEs) in e-learning applications — Part 1: Framework and reference model for semantic interoperability |
ISO/IEC 30100-2:2016 | Information technology Home network resource management Part 2: Architecture |
CAN/CSA-ISO/IEC 15944-20:16 | Information technology Business Operational View Part 20: Linking business operational view to functional service view (Adopted ISO/IEC 15944-20:2015, first edition, 2015-12-15) |
14/30279110 DC : DRAFT JUNE 2014 | BS ISO/IEC 15944-20 - INFORMATION TECHNOLOGY - BUSINESS OPERATIONAL VIEW - PART 20: LINKING BUSINESS OPERATIONAL VIEW TO FUNCTIONAL SERVICE VIEW |
CAN/CSA-ISO/IEC 30100-2:18 | Information technology — Home network resource management — Part 2: Architecture (Adopted ISO/IEC 30100-2:2016, first edition, 2016-04) |
ISO/TS 25237:2008 | Health informatics Pseudonymization |
ISO/IEC 15944-1:2011 | Information technology — Business operational view — Part 1: Operational aspects of open-edi for implementation |
ISO 22857:2013 | Health informatics — Guidelines on data protection to facilitate trans-border flows of personal health data |
ISO 1087-1:2000 | Terminology work Vocabulary Part 1: Theory and application |
ISO/IEC 7812-2:2017 | Identification cards — Identification of issuers — Part 2: Application and registration procedures |
ISO/IEC 11179-3:2013 | Information technology — Metadata registries (MDR) — Part 3: Registry metamodel and basic attributes |
ISO/IEC 15944-4:2015 | Information technology — Business operational view — Part 4: Business transaction scenarios — Accounting and economic ontology |
ISO/IEC 7501-2:1997 | Identification cards — Machine readable travel documents — Part 2: Machine readable visa |
ISO 5127:2017 | Information and documentation Foundation and vocabulary |
ISO/IEC TR 15944-6:2015 | Information technology — Business operational view — Part 6: Technical introduction to e-Business modelling |
ISO/IEC 15944-7:2009 | Information technology — Business operational view — Part 7: eBusiness vocabulary |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
ISO 19108:2002 | Geographic information Temporal schema |
ISO/IEC 14662:2010 | Information technology — Open-edi reference model |
ISO/IEC 6523-1:1998 | Information technology — Structure for the identification of organizations and organization parts — Part 1: Identification of organization identification schemes |
ISO/IEC 19501:2005 | Information technology — Open Distributed Processing — Unified Modeling Language (UML) Version 1.4.2 |
ISO 3166-2:2013 | Codes for the representation of names of countries and their subdivisions Part 2: Country subdivision code |
ISO 19115:2003 | Geographic information Metadata |
ISO 8601:2004 | Data elements and interchange formats Information interchange Representation of dates and times |
ISO/IEC 15944-5:2008 | Information technology — Business operational view — Part 5: Identification and referencing of requirements of jurisdictional domains as sources of external constraints |
ISO 639-2:1998 | Codes for the representation of names of languages — Part 2: Alpha-3 code |
ISO/IEC 7501-1:2008 | Identification cards — Machine readable travel documents — Part 1: Machine readable passport |
ISO/IEC 10181-2:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework |
ISO/IEC 7501-3:2005 | Identification cards — Machine readable travel documents — Part 3: Machine readable official travel documents |
ISO 19135:2005 | Geographic information — Procedures for item registration |
ISO/IEC 7812-1:2017 | Identification cards — Identification of issuers — Part 1: Numbering system |
ISO 3166-1:2013 | Codes for the representation of names of countries and their subdivisions Part 1: Country codes |
ISO/IEC 6523-2:1998 | Information technology — Structure for the identification of organizations and organization parts — Part 2: Registration of organization identification schemes |
ISO/IEC 15944-2:2015 | Information technology — Business operational view — Part 2: Registration of scenarios and their components as business objects |
ISO/IEC 5218:2004 | Information technology Codes for the representation of human sexes |
ISO 15489-1:2016 | Information and documentation Records management Part 1: Concepts and principles |
ISO/IEC TR 15285:1998 | Information technology An operational model for characters and glyphs |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
ISO/IEC TR 13335-1:1996 | Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT Security |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.