• Shopping Cart
    There are no items in your cart

ISO/IEC 29100:2011

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

Information technology — Security techniques — Privacy framework

Available format(s)

Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users

Superseded date

16-02-2024

Superseded by

ISO/IEC 29100:2024

Language(s)

French, English

Published date

05-12-2011

€60.00
Excluding VAT

ISO/IEC 29100:2011 provides a privacy framework which

  • specifies a common privacy terminology;
  • defines the actors and their roles in processing personally identifiable information (PII);
  • describes privacy safeguarding considerations; and
  • provides references to known privacy principles for information technology.

ISO/IEC 29100:2011 is applicable to natural persons and organizations involved in specifying, procuring, architecting, designing, developing, testing, maintaining, administering, and operating information and communication technology systems or services where privacy controls are required for the processing of PII.

Committee
ISO/IEC JTC 1/SC 27
DocumentType
Standard
Pages
23
PublisherName
International Organization for Standardization
Status
Superseded
SupersededBy

BS ISO/IEC 29101:2013 Information technology. Security techniques. Privacy architecture framework
BS PD ISO/TR 20748-2 : 2017 INFORMATION TECHNOLOGY FOR LEARNING, EDUCATION AND TRAINING - LEARNING ANALYTICS INTEROPERABILITY - PART 2: SYSTEM REQUIREMENTS
PD ISO/TR 17465-1:2014 Intelligent transport systems. Cooperative ITS Terms and definitions
BS ISO/IEC 29134:2017 Information technology. Security techniques. Guidelines for privacy impact assessment
ISO/TR 17465-1:2014 Intelligent transport systems Cooperative ITS Part 1: Terms and definitions
BS ISO/IEC 19944:2017 Information technology. Cloud computing. Cloud services and devices: Data flow, data categories and data use
18/30346433 DC : 0 BS ISO/IEC 19086-4 - INFORMATION TECHNOLOGY - CLOUD COMPUTING SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 4: SECURITY AND PRIVACY
12/30232747 DC : DRAFT JAN 2013 BS ISO/IEC 29182-4 - INFORMATION TECHNOLOGY-SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 4: ENTITY MODELS
CSA ISO/IEC 27050-1 : 2018 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ELECTRONIC DISCOVERY - PART 1: OVERVIEW AND CONCEPTS
14/30268906 DC : 0 BS ISO/IEC 17789 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE
TS 103 532 : 1.1.1 CYBER; ATTRIBUTE BASED ENCRYPTION FOR ATTRIBUTE BASED ACCESS CONTROL
17/30318701 DC : 0 BS ISO/IEC 19286 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PRIVACY-ENHANCING PROTOCOLS AND SERVICES
INCITS/ISO/IEC 24745 : 2012(R2017) INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION
INCITS/ISO/IEC 29182-4 : 2014 INFORMATION TECHNOLOGY - SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 4: ENTITY MODELS
CSA TELECOM ORGANIZATIONS PACKAGE : 2018 CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR
ISO/IEC 27018:2014 Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
S.R. CEN/TR 16742:2014 INTELLIGENT TRANSPORT SYSTEMS - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS IN EUROPE
ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
DIN ISO/IEC 17789:2017-07 INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014)
JIS X 9252:2023 Information technology -- Online privacy notices and consent
CSA ISO/IEC 27018 : 2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS
INCITS/ISO/IEC 29115 : 2014 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION ASSURANCE FRAMEWORK
ISO/IEC TR 30117:2014 Information technology Guide to on-card biometric comparison standards and applications
BS EN 16571:2014 Information technology. RFID privacy impact assessment process
BS ISO/IEC 29115:2013 Information technology. Security techniques. Entity authentication assurance framework
PD CEN/TR 16742:2014 Intelligent transport systems. Privacy aspects in ITS standards and systems in Europe
CSA ISO/IEC 27002 : 2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS
BS ISO/IEC 17789:2014 Information technology. Cloud computing. Reference architecture
PD ISO/TS 12812-2:2017 Core banking. Mobile financial services Security and data protection for mobile financial services
17/30349181 DC : 0 BS ISO/IEC 24760-1 AMENDMENT 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS
PD CEN/TS 16702-1:2014 Electronic fee collection. Secure monitoring for autonomous toll system Compliance checking
PD ISO/IEC TR 29144:2014 Information technology. Biometrics. The use of biometric technology in commercial Identity Management applications and processes
10/30143797 DC : 0 BS ISO/IEC 24760-1 - INFROMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS
12/30232744 DC : 0 BS ISO/IEC 29182-3 - REFERENCE ARCHITECTURE FOR SENSOR NETWORK APPLICATIONS AND SERVICES - PART 3: REFERENCE ARCHITECTURE VIEWS
BS ISO/IEC 29151:2017 Information technology. Security techniques. Code of practice for personally identifiable information protection
BS ISO/IEC 24760-1:2011 Information technology. Security techniques. A framework for identity management Terminology and concepts
18/30331887 DC : 0 BS ISO/IEC 20889 - INFORMATION TECHNOLOGY- SECURITY TECHNIQUES - PRIVACY ENHANCING DATA DE-IDENTIFICATION TECHNIQUES
BS ISO/IEC 38505-1:2017 Information technology. Governance of IT. Governance of data Application of ISO/IEC 38500 to the governance of data
ISO/IEC 19944:2017 Information technology Cloud computing Cloud services and devices: Data flow, data categories and data use
UNE-ISO/IEC 27002:2015 Information technology -- Security techniques -- Code of practice for information security controls
TR 103 304 : 1.1.1 CYBER; PERSONALLY IDENTIFIABLE INFORMATION (PII) PROTECTION IN MOBILE AND CLOUD SERVICES
ISO/IEC 29101:2013 Information technology Security techniques Privacy architecture framework
ISO/IEC 19286:2018 Identification cards — Integrated circuit cards — Privacy-enhancing protocols and services
BS ISO/IEC 27002 : 2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS
UNE-EN ISO/IEC 27002:2017 Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015)
ISO/TS 12812-2:2017 Core banking — Mobile financial services — Part 2: Security and data protection for mobile financial services
CEN/TS 16702-1:2014 Electronic fee collection - Secure monitoring for autonomous toll systems - Part 1: Compliance checking
DIN EN 16571:2014-10 INFORMATION TECHNOLOGY - RFID PRIVACY IMPACT ASSESSMENT PROCESS
16/30278511 DC : 0 BS ISO/IEC 29134 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PRIVACY IMPACT ASSESSMENT - GUIDELINES
DIN EN ISO/IEC 27002 E : 2017 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015)
ISO/IEC TR 20748-2:2017 Information technology for learning, education and training Learning analytics interoperability Part 2: System requirements
BS EN ISO/IEC 27002:2017 Information technology. Security techniques. Code of practice for information security controls
BS ISO/IEC 24745:2011 Information technology. Security techniques. Biometric information protection
12/30168690 DC : 0 BS ISO/IEC 29101 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PRIVACY ARCHITECTURE FRAMEWORK
15/30281583 DC : 0 BS ISO 12812-2 - CORE BANKING - MOBILE FINANCIAL SERVICES - PART 2: SECURITY AND DATA PROTECTION FOR MOBILE FINANCIAL SERVICES
ISO/IEC 29182-4:2013 Information technology Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models
BS ISO/IEC 19286:2018 Identification cards. Integrated circuit cards. Privacy-enhancing protocols and services
DIN EN ISO/IEC 27002:2017-06 Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015)
I.S. EN ISO 25237:2017 HEALTH INFORMATICS - PSEUDONYMIZATION (ISO 25237:2017)
S.R. CEN/TS 16702-1:2014 ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING
UNI EN 16571 : 2014 INFORMATION TECHNOLOGY - RFID PRIVACY IMPACT ASSESSMENT PROCESS
16/30287629 DC : 0 BS ISO/IEC 27050-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ELECTRONIC DISCOVERY - PART 1 OVERVIEW AND CONCEPTS
BS ISO/IEC 27018:2014 Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
CSA INFORMATION SECURITY PACKAGE : 2018 CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION
ISO/IEC 29182-3:2014 Information technology Sensor networks: Sensor Network Reference Architecture (SNRA) Part 3: Reference architecture views
14/30304350 DC : 0 BS EN ISO 27799 - HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002
10/30136309 DC : 0 BS ISO/IEC 24745 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION
UNI CEN/TS 16702-1 : 2014 ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING
12/30168696 DC : 0 BS ISO/IEC 29115 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION ASSURANCE FRAMEWORK
DIN ISO/IEC 17789:2016-10 (Draft) INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014)
16/30316173 DC : 0 BS ISO/IEC 19086-1 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 1: OVERVIEW AND CONCEPTS
DIN EN ISO 25237:2015-10 (Draft) HEALTH INFORMATICS - PSEUDONYMIZATION (ISO 25237:2017)
BS ISO/IEC 29182-4:2013 Information technology. Sensor networks: Sensor Network Reference Architecture (SNRA) Entity models
13/30266767 DC : 0 BS ISO/IEC 27018 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR P2 PROTECTION IN PUBLIC CLOUD ACTING AS P2 PROCESSORS
BS EN ISO 27799:2008 Health informatics. Information security management in health using ISO/IEC 27002
ISO/IEC 24760-3:2016 Information technology — Security techniques — A framework for identity management — Part 3: Practice
ISO/IEC 29134:2017 Information technology — Security techniques — Guidelines for privacy impact assessment
INCITS/ISO/IEC TR 29144 : 2015 INFORMATION TECHNOLOGY - BIOMETRICS - THE USE OF BIOMETRIC TECHNOLOGY IN COMMERCIAL IDENTITY MANAGEMENT APPLICATIONS AND PROCESSES
SR 003 391 : 2.1.1 CLOUD STANDARDS COORDINATION PHASE 2; INTEROPERABILITY AND SECURITY IN CLOUD COMPUTING
I.S. EN ISO/IEC 27002:2017 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015)
I.S. ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS
CEI UNI ISO/IEC 27002 : 2014 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS
ISO/IEC TR 29144:2014 Information technology Biometrics The use of biometric technology in commercial Identity Management applications and processes
ISO/IEC 29115:2013 Information technology — Security techniques — Entity authentication assurance framework
ISO 25237:2017 Health informatics — Pseudonymization
EN ISO/IEC 27002:2017 Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015)
EN ISO 27799:2016 Health informatics - Information security management in health using ISO/IEC 27002 (ISO 27799:2016)
EN ISO 25237:2017 Health informatics - Pseudonymization (ISO 25237:2017)
EN 16571:2014 Information technology - RFID privacy impact assessment process
BS ISO/IEC 29190:2015 Information technology. Security techniques. Privacy capability assessment model
ISO/IEC 24760-1:2011 Information technology Security techniques A framework for identity management Part 1: Terminology and concepts
16/30313038 DC : 0 BS ISO/IEC 19944 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - CLOUD SERVICES AND DEVICES: DATA FLOW, DATA CATEGORIES AND DATA USE
ISO/IEC TR 38505-2:2018 Information technology — Governance of IT — Governance of data — Part 2: Implications of ISO/IEC 38505-1 for data management
ISO/IEC 18305:2016 Information technology — Real time locating systems — Test and evaluation of localization and tracking systems
CAN/CSA-ISO/IEC 17789:16 Information technology Cloud computing Reference architecture (Adopted ISO/IEC 17789:2014, first edition, 2014-10-15)
BS EN ISO 25237:2017 Health informatics. Pseudonymization
DIN ISO/IEC 27018:2017-08 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS (ISO/IEC 27018:2014)
ISO/IEC 38505-1:2017 Information technology — Governance of IT — Governance of data — Part 1: Application of ISO/IEC 38500 to the governance of data
16/30333228 DC : 0 BS ISO/IEC 38505-1 - INFORMATION TECHNOLOGY - GOVERNANCE OF IT - PART 1: THE APPLICATION OF ISO/IEC 38500 TO THE GOVERNANCE OF DATA
INCITS/ISO/IEC 27002 : 2014 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS
DIN EN 16571 E : 2014 INFORMATION TECHNOLOGY - RFID PRIVACY IMPACT ASSESSMENT PROCESS
BS ISO/IEC 29182-3:2014 Information technology. Sensor networks: Sensor Network Reference Architecture (SNRA) Reference architecture views
14/30216195 DC : 0 BS ISO/IEC 29190 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PRIVACY CAPABILITY ASSESSMENT MODEL
ISO/IEC 29190:2015 Information technology Security techniques Privacy capability assessment model
18/30325702 DC : 0 BS ISO/IEC 27050-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ELECTRONIC DISCOVERY - PART 2: GUIDANCE FOR GOVERNANCE AND MANAGEMENT OF ELECTRONIC DISCOVERY
INCITS/ISO/IEC 29182-3 : 2014 INFORMATION TECHNOLOGY - SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 3: REFERENCE ARCHITECTURE VIEWS
I.S. EN 16571:2014 INFORMATION TECHNOLOGY - RFID PRIVACY IMPACT ASSESSMENT PROCESS
ISO/IEC 29151:2017 Information technology — Security techniques — Code of practice for personally identifiable information protection
UNI CEI ISO/IEC 27002 : 2014 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS
ISO/IEC 19086-1:2016 Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts
ISO/IEC 17789:2014 Information technology — Cloud computing — Reference architecture
ISO/IEC 24745:2011 Information technology Security techniques Biometric information protection
ISO/IEC 27050-1:2016 Information technology Security techniques Electronic discovery Part 1: Overview and concepts
15/30302181 DC : 0 BS ISO/IEC 18305 - INFORMATION TECHNOLOGY - REAL TIME LOCATING SYSTEMS - TEST AND EVALUATION OF LOCALIZATION AND TRACKING SYSTEMS
CEN/TR 16742:2014 Intelligent transport systems - Privacy aspects in ITS standards and systems in Europe
CAN/CSA-ISO/IEC 18305:18 Information technology — Real time locating systems — Test and evaluation of localization and tracking systems (Adopted ISO/IEC 1830 5:2016, first edition, 2016-11-01)
NS-ISO/IEC 42001:2023 Information technology - Artificial intelligence - Management system
CAN/CSA-ISO/IEC 19086-1:18 Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts (Adopted ISO/IEC 19086-1:2016, first edition, 2016-09-15)
INCITS/ISO/IEC 29115:2013[R2019] Information technology - Security techniques - Entity authentication assurance framework
INCITS/ISO/IEC 20889:2018 (2019) Privacy enhancing data de-identification terminology and classification of techniques
INCITS/ISO/IEC 27018:2019(2019) Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
INCITS/ISO/IEC 27050-2:2018(2019) Information technology -- Electronic discovery -- Part 2: Guidance for governance and management of electronic discovery<br>
CAN/CSA-ISO/IEC 24760-3:18 Information technology — Security techniques — A framework for identity management — Part 3: Practice (Adopted ISO/IEC 24760-3:2016, first edition, 2016-08-01)
ITU-T X.1410 (03/2023) Security architecture of data sharing management based on the distributed ledger technology

ISO 31000:2009 Risk management Principles and guidelines
SA/SNZ TR ISO/IEC 38505.2:2019 Information technology - Governance of IT - Governance of data Implications of ISO/IEC 38505-1 for data management
SA/SNZ TR ISO/IEC 20748.2:2020 Information technology for learning, education and training - Learning analytics interoperability System requirements
ISO Guide 73:2009 Risk management — Vocabulary
SA/SNZ TS ISO/IEC 20748.4:2020 Information technology for learning, education and training - Learning analytics interoperability Privacy and data protection policies

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.