• ISO/IEC 29100:2011

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    Information technology — Security techniques — Privacy framework

    Available format(s):  Hardcopy, PDF, PDF 3 Users, PDF 5 Users, PDF 9 Users

    Superseded date:  16-02-2024

    Language(s):  French, English

    Published date:  05-12-2011

    Publisher:  International Organization for Standardization

    Add To Cart

    Abstract - (Show below) - (Hide below)

    ISO/IEC 29100:2011 provides a privacy framework which

    • specifies a common privacy terminology;
    • defines the actors and their roles in processing personally identifiable information (PII);
    • describes privacy safeguarding considerations; and
    • provides references to known privacy principles for information technology.

    ISO/IEC 29100:2011 is applicable to natural persons and organizations involved in specifying, procuring, architecting, designing, developing, testing, maintaining, administering, and operating information and communication technology systems or services where privacy controls are required for the processing of PII.

    General Product Information - (Show below) - (Hide below)

    Committee ISO/IEC JTC 1/SC 27
    Document Type Standard
    Publisher International Organization for Standardization
    Status Superseded
    Superseded By

    Standards Referenced By This Book - (Show below) - (Hide below)

    BS ISO/IEC 29101:2013 Information technology. Security techniques. Privacy architecture framework
    BS PD ISO/TR 20748-2 : 2017 INFORMATION TECHNOLOGY FOR LEARNING, EDUCATION AND TRAINING - LEARNING ANALYTICS INTEROPERABILITY - PART 2: SYSTEM REQUIREMENTS
    PD ISO/TR 17465-1:2014 Intelligent transport systems. Cooperative ITS Terms and definitions
    BS ISO/IEC 29134:2017 Information technology. Security techniques. Guidelines for privacy impact assessment
    ISO/TR 17465-1:2014 Intelligent transport systems Cooperative ITS Part 1: Terms and definitions
    BS ISO/IEC 19944:2017 Information technology. Cloud computing. Cloud services and devices: Data flow, data categories and data use
    18/30346433 DC : 0 BS ISO/IEC 19086-4 - INFORMATION TECHNOLOGY - CLOUD COMPUTING SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 4: SECURITY AND PRIVACY
    12/30232747 DC : DRAFT JAN 2013 BS ISO/IEC 29182-4 - INFORMATION TECHNOLOGY-SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 4: ENTITY MODELS
    CSA ISO/IEC 27050-1 : 2018 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ELECTRONIC DISCOVERY - PART 1: OVERVIEW AND CONCEPTS
    14/30268906 DC : 0 BS ISO/IEC 17789 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE
    TS 103 532 : 1.1.1 CYBER; ATTRIBUTE BASED ENCRYPTION FOR ATTRIBUTE BASED ACCESS CONTROL
    17/30318701 DC : 0 BS ISO/IEC 19286 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PRIVACY-ENHANCING PROTOCOLS AND SERVICES
    INCITS/ISO/IEC 24745 : 2012(R2017) INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION
    INCITS/ISO/IEC 29182-4 : 2014 INFORMATION TECHNOLOGY - SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 4: ENTITY MODELS
    CSA TELECOM ORGANIZATIONS PACKAGE : 2018 CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR
    ISO/IEC 27018:2014 Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
    S.R. CEN/TR 16742:2014 INTELLIGENT TRANSPORT SYSTEMS - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS IN EUROPE
    ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
    DIN ISO/IEC 17789:2017-07 INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014)
    JIS X 9252:2023 Information technology -- Online privacy notices and consent
    CSA ISO/IEC 27018 : 2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS
    INCITS/ISO/IEC 29115 : 2014 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION ASSURANCE FRAMEWORK
    ISO/IEC TR 30117:2014 Information technology Guide to on-card biometric comparison standards and applications
    BS EN 16571:2014 Information technology. RFID privacy impact assessment process
    BS ISO/IEC 29115:2013 Information technology. Security techniques. Entity authentication assurance framework
    PD CEN/TR 16742:2014 Intelligent transport systems. Privacy aspects in ITS standards and systems in Europe
    CSA ISO/IEC 27002 : 2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS
    BS ISO/IEC 17789:2014 Information technology. Cloud computing. Reference architecture
    PD ISO/TS 12812-2:2017 Core banking. Mobile financial services Security and data protection for mobile financial services
    17/30349181 DC : 0 BS ISO/IEC 24760-1 AMENDMENT 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS
    PD CEN/TS 16702-1:2014 Electronic fee collection. Secure monitoring for autonomous toll system Compliance checking
    PD ISO/IEC TR 29144:2014 Information technology. Biometrics. The use of biometric technology in commercial Identity Management applications and processes
    10/30143797 DC : 0 BS ISO/IEC 24760-1 - INFROMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS
    12/30232744 DC : 0 BS ISO/IEC 29182-3 - REFERENCE ARCHITECTURE FOR SENSOR NETWORK APPLICATIONS AND SERVICES - PART 3: REFERENCE ARCHITECTURE VIEWS
    BS ISO/IEC 29151:2017 Information technology. Security techniques. Code of practice for personally identifiable information protection
    BS ISO/IEC 24760-1:2011 Information technology. Security techniques. A framework for identity management Terminology and concepts
    18/30331887 DC : 0 BS ISO/IEC 20889 - INFORMATION TECHNOLOGY- SECURITY TECHNIQUES - PRIVACY ENHANCING DATA DE-IDENTIFICATION TECHNIQUES
    BS ISO/IEC 38505-1:2017 Information technology. Governance of IT. Governance of data Application of ISO/IEC 38500 to the governance of data
    ISO/IEC 19944:2017 Information technology Cloud computing Cloud services and devices: Data flow, data categories and data use
    UNE-ISO/IEC 27002:2015 Information technology -- Security techniques -- Code of practice for information security controls
    TR 103 304 : 1.1.1 CYBER; PERSONALLY IDENTIFIABLE INFORMATION (PII) PROTECTION IN MOBILE AND CLOUD SERVICES
    ISO/IEC 29101:2013 Information technology Security techniques Privacy architecture framework
    ISO/IEC 19286:2018 Identification cards — Integrated circuit cards — Privacy-enhancing protocols and services
    BS ISO/IEC 27002 : 2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS
    UNE-EN ISO/IEC 27002:2017 Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015)
    ISO/TS 12812-2:2017 Core banking — Mobile financial services — Part 2: Security and data protection for mobile financial services
    CEN/TS 16702-1:2014 Electronic fee collection - Secure monitoring for autonomous toll systems - Part 1: Compliance checking
    DIN EN 16571:2014-10 INFORMATION TECHNOLOGY - RFID PRIVACY IMPACT ASSESSMENT PROCESS
    16/30278511 DC : 0 BS ISO/IEC 29134 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PRIVACY IMPACT ASSESSMENT - GUIDELINES
    DIN EN ISO/IEC 27002 E : 2017 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015)
    ISO/IEC TR 20748-2:2017 Information technology for learning, education and training Learning analytics interoperability Part 2: System requirements
    BS EN ISO/IEC 27002:2017 Information technology. Security techniques. Code of practice for information security controls
    BS ISO/IEC 24745:2011 Information technology. Security techniques. Biometric information protection
    12/30168690 DC : 0 BS ISO/IEC 29101 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PRIVACY ARCHITECTURE FRAMEWORK
    15/30281583 DC : 0 BS ISO 12812-2 - CORE BANKING - MOBILE FINANCIAL SERVICES - PART 2: SECURITY AND DATA PROTECTION FOR MOBILE FINANCIAL SERVICES
    ISO/IEC 29182-4:2013 Information technology Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models
    BS ISO/IEC 19286:2018 Identification cards. Integrated circuit cards. Privacy-enhancing protocols and services
    DIN EN ISO/IEC 27002:2017-06 Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015)
    I.S. EN ISO 25237:2017 HEALTH INFORMATICS - PSEUDONYMIZATION (ISO 25237:2017)
    S.R. CEN/TS 16702-1:2014 ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING
    UNI EN 16571 : 2014 INFORMATION TECHNOLOGY - RFID PRIVACY IMPACT ASSESSMENT PROCESS
    16/30287629 DC : 0 BS ISO/IEC 27050-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ELECTRONIC DISCOVERY - PART 1 OVERVIEW AND CONCEPTS
    BS ISO/IEC 27018:2014 Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
    CSA INFORMATION SECURITY PACKAGE : 2018 CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION
    ISO/IEC 29182-3:2014 Information technology Sensor networks: Sensor Network Reference Architecture (SNRA) Part 3: Reference architecture views
    14/30304350 DC : 0 BS EN ISO 27799 - HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002
    10/30136309 DC : 0 BS ISO/IEC 24745 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION
    UNI CEN/TS 16702-1 : 2014 ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING
    12/30168696 DC : 0 BS ISO/IEC 29115 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION ASSURANCE FRAMEWORK
    DIN ISO/IEC 17789:2016-10 (Draft) INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014)
    16/30316173 DC : 0 BS ISO/IEC 19086-1 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 1: OVERVIEW AND CONCEPTS
    DIN EN ISO 25237:2015-10 (Draft) HEALTH INFORMATICS - PSEUDONYMIZATION (ISO 25237:2017)
    BS ISO/IEC 29182-4:2013 Information technology. Sensor networks: Sensor Network Reference Architecture (SNRA) Entity models
    13/30266767 DC : 0 BS ISO/IEC 27018 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR P2 PROTECTION IN PUBLIC CLOUD ACTING AS P2 PROCESSORS
    BS EN ISO 27799:2008 Health informatics. Information security management in health using ISO/IEC 27002
    ISO/IEC 24760-3:2016 Information technology — Security techniques — A framework for identity management — Part 3: Practice
    ISO/IEC 29134:2017 Information technology — Security techniques — Guidelines for privacy impact assessment
    INCITS/ISO/IEC TR 29144 : 2015 INFORMATION TECHNOLOGY - BIOMETRICS - THE USE OF BIOMETRIC TECHNOLOGY IN COMMERCIAL IDENTITY MANAGEMENT APPLICATIONS AND PROCESSES
    CAN/CSA-ISO/IEC 19086-1:18 Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts (Adopted ISO/IEC 19086-1:2016, first edition, 2016-09-15)
    SR 003 391 : 2.1.1 CLOUD STANDARDS COORDINATION PHASE 2; INTEROPERABILITY AND SECURITY IN CLOUD COMPUTING
    CAN/CSA-ISO/IEC 18305:18 Information technology — Real time locating systems — Test and evaluation of localization and tracking systems (Adopted ISO/IEC 1830 5:2016, first edition, 2016-11-01)
    I.S. EN ISO/IEC 27002:2017 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015)
    I.S. ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS
    CEI UNI ISO/IEC 27002 : 2014 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS
    ISO/IEC TR 29144:2014 Information technology Biometrics The use of biometric technology in commercial Identity Management applications and processes
    ISO/IEC 29115:2013 Information technology Security techniques Entity authentication assurance framework
    ISO 25237:2017 Health informatics — Pseudonymization
    EN ISO/IEC 27002:2017 Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015)
    EN ISO 27799:2016 Health informatics - Information security management in health using ISO/IEC 27002 (ISO 27799:2016)
    EN ISO 25237:2017 Health informatics - Pseudonymization (ISO 25237:2017)
    EN 16571:2014 Information technology - RFID privacy impact assessment process
    BS ISO/IEC 29190:2015 Information technology. Security techniques. Privacy capability assessment model
    ISO/IEC 24760-1:2011 Information technology Security techniques A framework for identity management Part 1: Terminology and concepts
    16/30313038 DC : 0 BS ISO/IEC 19944 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - CLOUD SERVICES AND DEVICES: DATA FLOW, DATA CATEGORIES AND DATA USE
    ISO/IEC TR 38505-2:2018 Information technology — Governance of IT — Governance of data — Part 2: Implications of ISO/IEC 38505-1 for data management
    ISO/IEC 18305:2016 Information technology — Real time locating systems — Test and evaluation of localization and tracking systems
    CAN/CSA-ISO/IEC 17789:16 Information technology Cloud computing Reference architecture (Adopted ISO/IEC 17789:2014, first edition, 2014-10-15)
    BS EN ISO 25237:2017 Health informatics. Pseudonymization
    DIN ISO/IEC 17789 E : 2017 INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014)
    DIN ISO/IEC 27018:2017-08 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS (ISO/IEC 27018:2014)
    ISO/IEC 38505-1:2017 Information technology — Governance of IT — Governance of data — Part 1: Application of ISO/IEC 38500 to the governance of data
    16/30333228 DC : 0 BS ISO/IEC 38505-1 - INFORMATION TECHNOLOGY - GOVERNANCE OF IT - PART 1: THE APPLICATION OF ISO/IEC 38500 TO THE GOVERNANCE OF DATA
    INCITS/ISO/IEC 27002 : 2014 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS
    DIN EN 16571 E : 2014 INFORMATION TECHNOLOGY - RFID PRIVACY IMPACT ASSESSMENT PROCESS
    BS ISO/IEC 29182-3:2014 Information technology. Sensor networks: Sensor Network Reference Architecture (SNRA) Reference architecture views
    14/30216195 DC : 0 BS ISO/IEC 29190 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PRIVACY CAPABILITY ASSESSMENT MODEL
    ISO/IEC 29190:2015 Information technology Security techniques Privacy capability assessment model
    18/30325702 DC : 0 BS ISO/IEC 27050-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ELECTRONIC DISCOVERY - PART 2: GUIDANCE FOR GOVERNANCE AND MANAGEMENT OF ELECTRONIC DISCOVERY
    INCITS/ISO/IEC 29182-3 : 2014 INFORMATION TECHNOLOGY - SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 3: REFERENCE ARCHITECTURE VIEWS
    I.S. EN 16571:2014 INFORMATION TECHNOLOGY - RFID PRIVACY IMPACT ASSESSMENT PROCESS
    ISO/IEC 29151:2017 Information technology — Security techniques — Code of practice for personally identifiable information protection
    CAN/CSA-ISO/IEC 24760-3:18 Information technology — Security techniques — A framework for identity management — Part 3: Practice (Adopted ISO/IEC 24760-3:2016, first edition, 2016-08-01)
    UNI CEI ISO/IEC 27002 : 2014 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS
    ISO/IEC 19086-1:2016 Information technology Cloud computing Service level agreement (SLA) framework Part 1: Overview and concepts
    ISO/IEC 17789:2014 Information technology — Cloud computing — Reference architecture
    ISO/IEC 24745:2011 Information technology Security techniques Biometric information protection
    ISO/IEC 27050-1:2016 Information technology Security techniques Electronic discovery Part 1: Overview and concepts
    15/30302181 DC : 0 BS ISO/IEC 18305 - INFORMATION TECHNOLOGY - REAL TIME LOCATING SYSTEMS - TEST AND EVALUATION OF LOCALIZATION AND TRACKING SYSTEMS
    CEN/TR 16742 : 2014 INTELLIGENT TRANSPORT SYSTEMS - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS IN EUROPE
    NS-ISO/IEC 42001:2023 Information technology - Artificial intelligence - Management system
    ITU-T X.1410 (03/2023) Security architecture of data sharing management based on the distributed ledger technology

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO 31000:2009 Risk management Principles and guidelines
    SA/SNZ TR ISO/IEC 38505.2:2019 Information technology - Governance of IT - Governance of data Implications of ISO/IEC 38505-1 for data management
    SA/SNZ TR ISO/IEC 20748.2:2020 Information technology for learning, education and training - Learning analytics interoperability System requirements
    ISO Guide 73:2009 Risk management — Vocabulary
    SA/SNZ TS ISO/IEC 20748.4:2020 Information technology for learning, education and training - Learning analytics interoperability Privacy and data protection policies
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective