ISO/IEC 29100:2011
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Information technology — Security techniques — Privacy framework
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
16-02-2024
French, English
05-12-2011
ISO/IEC 29100:2011 provides a privacy framework which
- specifies a common privacy terminology;
- defines the actors and their roles in processing personally identifiable information (PII);
- describes privacy safeguarding considerations; and
- provides references to known privacy principles for information technology.
ISO/IEC 29100:2011 is applicable to natural persons and organizations involved in specifying, procuring, architecting, designing, developing, testing, maintaining, administering, and operating information and communication technology systems or services where privacy controls are required for the processing of PII.
Committee |
ISO/IEC JTC 1/SC 27
|
DocumentType |
Standard
|
Pages |
23
|
PublisherName |
International Organization for Standardization
|
Status |
Superseded
|
SupersededBy |
Standards | Relationship |
PN-EN ISO/IEC 29100:2020-11 | Identical |
JIS X 9250:2017 | Identical |
DIN EN ISO/IEC 29100:2020-09 | Identical |
PN ISO/IEC 29100 : 2017 | Identical |
NS ISO/IEC 29100 : 2011 | Identical |
17/30361107 DC : 0 | Identical |
NEN ISO/IEC 29100 : 2012 | Identical |
CEI UNI ISO/IEC 29100 : 2016 | Identical |
INCITS/ISO/IEC 29100 : 2012 | Identical |
UNI CEI ISO/IEC 29100 : 2015 COR 1 2015 | Identical |
BS ISO/IEC 29100 : 2011 | Identical |
GOST R ISO/IEC 29100 : 2013 | Identical |
UNI CEI ISO/IEC 29100 : 2015 | Identical |
CEI UNI EN ISO/IEC 29100:2021 | Identical |
NF EN ISO/IEC 29100:2020 | Identical |
EN ISO/IEC 29100:2020 | Identical |
NEN-EN-ISO/IEC 29100:2020 | Identical |
I.S. EN ISO/IEC 29100:2020 | Identical |
UNI CEI EN ISO/IEC 29100:2020 | Identical |
ÖVE/ÖNORM EN ISO/IEC 29100:2020 08 15 | Identical |
DS ISO/IEC 29100 : 2012 | Identical |
UNE-EN ISO/IEC 29100:2020 | Identical |
I.S. EN ISO/IEC 29100:2020&LC:2020 | Identical |
BS ISO/IEC 29101:2013 | Information technology. Security techniques. Privacy architecture framework |
BS PD ISO/TR 20748-2 : 2017 | INFORMATION TECHNOLOGY FOR LEARNING, EDUCATION AND TRAINING - LEARNING ANALYTICS INTEROPERABILITY - PART 2: SYSTEM REQUIREMENTS |
PD ISO/TR 17465-1:2014 | Intelligent transport systems. Cooperative ITS Terms and definitions |
BS ISO/IEC 29134:2017 | Information technology. Security techniques. Guidelines for privacy impact assessment |
ISO/TR 17465-1:2014 | Intelligent transport systems Cooperative ITS Part 1: Terms and definitions |
BS ISO/IEC 19944:2017 | Information technology. Cloud computing. Cloud services and devices: Data flow, data categories and data use |
18/30346433 DC : 0 | BS ISO/IEC 19086-4 - INFORMATION TECHNOLOGY - CLOUD COMPUTING SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 4: SECURITY AND PRIVACY |
12/30232747 DC : DRAFT JAN 2013 | BS ISO/IEC 29182-4 - INFORMATION TECHNOLOGY-SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 4: ENTITY MODELS |
CSA ISO/IEC 27050-1 : 2018 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ELECTRONIC DISCOVERY - PART 1: OVERVIEW AND CONCEPTS |
14/30268906 DC : 0 | BS ISO/IEC 17789 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE |
TS 103 532 : 1.1.1 | CYBER; ATTRIBUTE BASED ENCRYPTION FOR ATTRIBUTE BASED ACCESS CONTROL |
17/30318701 DC : 0 | BS ISO/IEC 19286 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PRIVACY-ENHANCING PROTOCOLS AND SERVICES |
INCITS/ISO/IEC 24745 : 2012(R2017) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION |
INCITS/ISO/IEC 29182-4 : 2014 | INFORMATION TECHNOLOGY - SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 4: ENTITY MODELS |
CSA TELECOM ORGANIZATIONS PACKAGE : 2018 | CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR |
ISO/IEC 27018:2014 | Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
S.R. CEN/TR 16742:2014 | INTELLIGENT TRANSPORT SYSTEMS - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS IN EUROPE |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
DIN ISO/IEC 17789:2017-07 | INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014) |
JIS X 9252:2023 | Information technology -- Online privacy notices and consent |
CSA ISO/IEC 27018 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS |
INCITS/ISO/IEC 29115 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION ASSURANCE FRAMEWORK |
ISO/IEC TR 30117:2014 | Information technology Guide to on-card biometric comparison standards and applications |
BS EN 16571:2014 | Information technology. RFID privacy impact assessment process |
BS ISO/IEC 29115:2013 | Information technology. Security techniques. Entity authentication assurance framework |
PD CEN/TR 16742:2014 | Intelligent transport systems. Privacy aspects in ITS standards and systems in Europe |
CSA ISO/IEC 27002 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
BS ISO/IEC 17789:2014 | Information technology. Cloud computing. Reference architecture |
PD ISO/TS 12812-2:2017 | Core banking. Mobile financial services Security and data protection for mobile financial services |
17/30349181 DC : 0 | BS ISO/IEC 24760-1 AMENDMENT 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS |
PD CEN/TS 16702-1:2014 | Electronic fee collection. Secure monitoring for autonomous toll system Compliance checking |
PD ISO/IEC TR 29144:2014 | Information technology. Biometrics. The use of biometric technology in commercial Identity Management applications and processes |
10/30143797 DC : 0 | BS ISO/IEC 24760-1 - INFROMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS |
12/30232744 DC : 0 | BS ISO/IEC 29182-3 - REFERENCE ARCHITECTURE FOR SENSOR NETWORK APPLICATIONS AND SERVICES - PART 3: REFERENCE ARCHITECTURE VIEWS |
BS ISO/IEC 29151:2017 | Information technology. Security techniques. Code of practice for personally identifiable information protection |
BS ISO/IEC 24760-1:2011 | Information technology. Security techniques. A framework for identity management Terminology and concepts |
18/30331887 DC : 0 | BS ISO/IEC 20889 - INFORMATION TECHNOLOGY- SECURITY TECHNIQUES - PRIVACY ENHANCING DATA DE-IDENTIFICATION TECHNIQUES |
BS ISO/IEC 38505-1:2017 | Information technology. Governance of IT. Governance of data Application of ISO/IEC 38500 to the governance of data |
ISO/IEC 19944:2017 | Information technology Cloud computing Cloud services and devices: Data flow, data categories and data use |
UNE-ISO/IEC 27002:2015 | Information technology -- Security techniques -- Code of practice for information security controls |
TR 103 304 : 1.1.1 | CYBER; PERSONALLY IDENTIFIABLE INFORMATION (PII) PROTECTION IN MOBILE AND CLOUD SERVICES |
ISO/IEC 29101:2013 | Information technology Security techniques Privacy architecture framework |
ISO/IEC 19286:2018 | Identification cards — Integrated circuit cards — Privacy-enhancing protocols and services |
BS ISO/IEC 27002 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
UNE-EN ISO/IEC 27002:2017 | Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
ISO/TS 12812-2:2017 | Core banking — Mobile financial services — Part 2: Security and data protection for mobile financial services |
CEN/TS 16702-1:2014 | Electronic fee collection - Secure monitoring for autonomous toll systems - Part 1: Compliance checking |
DIN EN 16571:2014-10 | INFORMATION TECHNOLOGY - RFID PRIVACY IMPACT ASSESSMENT PROCESS |
16/30278511 DC : 0 | BS ISO/IEC 29134 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PRIVACY IMPACT ASSESSMENT - GUIDELINES |
DIN EN ISO/IEC 27002 E : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
ISO/IEC TR 20748-2:2017 | Information technology for learning, education and training Learning analytics interoperability Part 2: System requirements |
BS EN ISO/IEC 27002:2017 | Information technology. Security techniques. Code of practice for information security controls |
BS ISO/IEC 24745:2011 | Information technology. Security techniques. Biometric information protection |
12/30168690 DC : 0 | BS ISO/IEC 29101 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PRIVACY ARCHITECTURE FRAMEWORK |
15/30281583 DC : 0 | BS ISO 12812-2 - CORE BANKING - MOBILE FINANCIAL SERVICES - PART 2: SECURITY AND DATA PROTECTION FOR MOBILE FINANCIAL SERVICES |
ISO/IEC 29182-4:2013 | Information technology Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models |
BS ISO/IEC 19286:2018 | Identification cards. Integrated circuit cards. Privacy-enhancing protocols and services |
DIN EN ISO/IEC 27002:2017-06 | Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
I.S. EN ISO 25237:2017 | HEALTH INFORMATICS - PSEUDONYMIZATION (ISO 25237:2017) |
S.R. CEN/TS 16702-1:2014 | ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING |
UNI EN 16571 : 2014 | INFORMATION TECHNOLOGY - RFID PRIVACY IMPACT ASSESSMENT PROCESS |
16/30287629 DC : 0 | BS ISO/IEC 27050-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ELECTRONIC DISCOVERY - PART 1 OVERVIEW AND CONCEPTS |
BS ISO/IEC 27018:2014 | Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
CSA INFORMATION SECURITY PACKAGE : 2018 | CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION |
ISO/IEC 29182-3:2014 | Information technology Sensor networks: Sensor Network Reference Architecture (SNRA) Part 3: Reference architecture views |
14/30304350 DC : 0 | BS EN ISO 27799 - HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 |
10/30136309 DC : 0 | BS ISO/IEC 24745 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION |
UNI CEN/TS 16702-1 : 2014 | ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING |
12/30168696 DC : 0 | BS ISO/IEC 29115 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION ASSURANCE FRAMEWORK |
DIN ISO/IEC 17789:2016-10 (Draft) | INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014) |
16/30316173 DC : 0 | BS ISO/IEC 19086-1 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 1: OVERVIEW AND CONCEPTS |
DIN EN ISO 25237:2015-10 (Draft) | HEALTH INFORMATICS - PSEUDONYMIZATION (ISO 25237:2017) |
BS ISO/IEC 29182-4:2013 | Information technology. Sensor networks: Sensor Network Reference Architecture (SNRA) Entity models |
13/30266767 DC : 0 | BS ISO/IEC 27018 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR P2 PROTECTION IN PUBLIC CLOUD ACTING AS P2 PROCESSORS |
BS EN ISO 27799:2008 | Health informatics. Information security management in health using ISO/IEC 27002 |
ISO/IEC 24760-3:2016 | Information technology — Security techniques — A framework for identity management — Part 3: Practice |
ISO/IEC 29134:2017 | Information technology — Security techniques — Guidelines for privacy impact assessment |
INCITS/ISO/IEC TR 29144 : 2015 | INFORMATION TECHNOLOGY - BIOMETRICS - THE USE OF BIOMETRIC TECHNOLOGY IN COMMERCIAL IDENTITY MANAGEMENT APPLICATIONS AND PROCESSES |
SR 003 391 : 2.1.1 | CLOUD STANDARDS COORDINATION PHASE 2; INTEROPERABILITY AND SECURITY IN CLOUD COMPUTING |
I.S. EN ISO/IEC 27002:2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
I.S. ISO/IEC 27002:2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
CEI UNI ISO/IEC 27002 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
ISO/IEC TR 29144:2014 | Information technology Biometrics The use of biometric technology in commercial Identity Management applications and processes |
ISO/IEC 29115:2013 | Information technology — Security techniques — Entity authentication assurance framework |
ISO 25237:2017 | Health informatics — Pseudonymization |
EN ISO/IEC 27002:2017 | Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
EN ISO 27799:2016 | Health informatics - Information security management in health using ISO/IEC 27002 (ISO 27799:2016) |
EN ISO 25237:2017 | Health informatics - Pseudonymization (ISO 25237:2017) |
EN 16571:2014 | Information technology - RFID privacy impact assessment process |
BS ISO/IEC 29190:2015 | Information technology. Security techniques. Privacy capability assessment model |
ISO/IEC 24760-1:2011 | Information technology Security techniques A framework for identity management Part 1: Terminology and concepts |
16/30313038 DC : 0 | BS ISO/IEC 19944 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - CLOUD SERVICES AND DEVICES: DATA FLOW, DATA CATEGORIES AND DATA USE |
ISO/IEC TR 38505-2:2018 | Information technology — Governance of IT — Governance of data — Part 2: Implications of ISO/IEC 38505-1 for data management |
ISO/IEC 18305:2016 | Information technology — Real time locating systems — Test and evaluation of localization and tracking systems |
CAN/CSA-ISO/IEC 17789:16 | Information technology Cloud computing Reference architecture (Adopted ISO/IEC 17789:2014, first edition, 2014-10-15) |
BS EN ISO 25237:2017 | Health informatics. Pseudonymization |
DIN ISO/IEC 27018:2017-08 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS (ISO/IEC 27018:2014) |
ISO/IEC 38505-1:2017 | Information technology — Governance of IT — Governance of data — Part 1: Application of ISO/IEC 38500 to the governance of data |
16/30333228 DC : 0 | BS ISO/IEC 38505-1 - INFORMATION TECHNOLOGY - GOVERNANCE OF IT - PART 1: THE APPLICATION OF ISO/IEC 38500 TO THE GOVERNANCE OF DATA |
INCITS/ISO/IEC 27002 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
DIN EN 16571 E : 2014 | INFORMATION TECHNOLOGY - RFID PRIVACY IMPACT ASSESSMENT PROCESS |
BS ISO/IEC 29182-3:2014 | Information technology. Sensor networks: Sensor Network Reference Architecture (SNRA) Reference architecture views |
14/30216195 DC : 0 | BS ISO/IEC 29190 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PRIVACY CAPABILITY ASSESSMENT MODEL |
ISO/IEC 29190:2015 | Information technology Security techniques Privacy capability assessment model |
18/30325702 DC : 0 | BS ISO/IEC 27050-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ELECTRONIC DISCOVERY - PART 2: GUIDANCE FOR GOVERNANCE AND MANAGEMENT OF ELECTRONIC DISCOVERY |
INCITS/ISO/IEC 29182-3 : 2014 | INFORMATION TECHNOLOGY - SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 3: REFERENCE ARCHITECTURE VIEWS |
I.S. EN 16571:2014 | INFORMATION TECHNOLOGY - RFID PRIVACY IMPACT ASSESSMENT PROCESS |
ISO/IEC 29151:2017 | Information technology — Security techniques — Code of practice for personally identifiable information protection |
UNI CEI ISO/IEC 27002 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
ISO/IEC 19086-1:2016 | Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts |
ISO/IEC 17789:2014 | Information technology — Cloud computing — Reference architecture |
ISO/IEC 24745:2011 | Information technology Security techniques Biometric information protection |
ISO/IEC 27050-1:2016 | Information technology Security techniques Electronic discovery Part 1: Overview and concepts |
15/30302181 DC : 0 | BS ISO/IEC 18305 - INFORMATION TECHNOLOGY - REAL TIME LOCATING SYSTEMS - TEST AND EVALUATION OF LOCALIZATION AND TRACKING SYSTEMS |
CEN/TR 16742:2014 | Intelligent transport systems - Privacy aspects in ITS standards and systems in Europe |
CAN/CSA-ISO/IEC 18305:18 | Information technology — Real time locating systems — Test and evaluation of localization and tracking systems (Adopted ISO/IEC 1830 5:2016, first edition, 2016-11-01) |
NS-ISO/IEC 42001:2023 | Information technology - Artificial intelligence - Management system |
CAN/CSA-ISO/IEC 19086-1:18 | Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts (Adopted ISO/IEC 19086-1:2016, first edition, 2016-09-15) |
INCITS/ISO/IEC 29115:2013[R2019] | Information technology - Security techniques - Entity authentication assurance framework |
INCITS/ISO/IEC 20889:2018 (2019) | Privacy enhancing data de-identification terminology and classification of techniques |
INCITS/ISO/IEC 27018:2019(2019) | Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
INCITS/ISO/IEC 27050-2:2018(2019) | Information technology -- Electronic discovery -- Part 2: Guidance for governance and management of electronic discovery<br> |
CAN/CSA-ISO/IEC 24760-3:18 | Information technology — Security techniques — A framework for identity management — Part 3: Practice (Adopted ISO/IEC 24760-3:2016, first edition, 2016-08-01) |
ITU-T X.1410 (03/2023) | Security architecture of data sharing management based on the distributed ledger technology |
ISO 31000:2009 | Risk management Principles and guidelines |
SA/SNZ TR ISO/IEC 38505.2:2019 | Information technology - Governance of IT - Governance of data Implications of ISO/IEC 38505-1 for data management |
SA/SNZ TR ISO/IEC 20748.2:2020 | Information technology for learning, education and training - Learning analytics interoperability System requirements |
ISO Guide 73:2009 | Risk management — Vocabulary |
SA/SNZ TS ISO/IEC 20748.4:2020 | Information technology for learning, education and training - Learning analytics interoperability Privacy and data protection policies |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.