ISO/IEC 29134:2017
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Information technology — Security techniques — Guidelines for privacy impact assessment
Hardcopy , PDF
French, English
28-06-2017
09-04-2025
This document gives guidelines for
— a process on privacy impact assessments, and
— a structure and content of a PIA report.
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.
| Committee |
ISO/IEC JTC 1/SC 27
|
| DocumentType |
Standard
|
| Pages |
47
|
| PublisherName |
International Organization for Standardization
|
| Status |
Withdrawn
|
| SupersededBy |
| Standards | Relationship |
| DIN EN ISO/IEC 29134:2020-09 | Identical |
| PN-ISO/IEC 29134:2018-11 | Identical |
| NS-ISO/IEC 29134 : 2017 | Identical |
| I.S. EN ISO/IEC 29134:2020&LC:2020 | Identical |
| CEI UNI EN ISO/IEC 29134 : 2020 | Identical |
| ÖVE/ÖNORM EN ISO/IEC 29134:2020 09 15 | Identical |
| PN-EN ISO/IEC 29134:2020-09 | Identical |
| NEN ISO/IEC 29134 : 2017 | Identical |
| BS ISO/IEC 29134:2017 | Identical |
| EN ISO/IEC 29134:2020 | Identical |
| BS EN ISO/IEC 29134:2020 | Identical |
| SS-EN ISO/IEC 29134:2020 | Identical |
| I.S. EN ISO 29134:2020 | Identical |
| NEN-EN-ISO/IEC 29134:2020 | Identical |
| JIS X 9251:2021 | Identical |
| INCITS/ISO/IEC 29134:2017(2019) | Identical |
| EN ISO 29134:2020 | Identical |
| ABNT NBR ISO/IEC 29134:2020 | Identical |
| UNE-EN ISO/IEC 29134:2020 | Identical |
| 17/30318701 DC : 0 | BS ISO/IEC 19286 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PRIVACY-ENHANCING PROTOCOLS AND SERVICES |
| ISO/IEC 27018:2014 | Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
| BS ISO/IEC 29151:2017 | Information technology. Security techniques. Code of practice for personally identifiable information protection |
| 18/30331887 DC : 0 | BS ISO/IEC 20889 - INFORMATION TECHNOLOGY- SECURITY TECHNIQUES - PRIVACY ENHANCING DATA DE-IDENTIFICATION TECHNIQUES |
| ISO/IEC 19286:2018 | Identification cards — Integrated circuit cards — Privacy-enhancing protocols and services |
| BS ISO/IEC 19286:2018 | Identification cards. Integrated circuit cards. Privacy-enhancing protocols and services |
| BS ISO/IEC 27018:2014 | Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
| ISO/IEC 24760-3:2016 | Information technology — Security techniques — A framework for identity management — Part 3: Practice |
| 13/30266767 DC : 0 | BS ISO/IEC 27018 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR P2 PROTECTION IN PUBLIC CLOUD ACTING AS P2 PROCESSORS |
| DIN ISO/IEC 27018:2017-08 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS (ISO/IEC 27018:2014) |
| ISO/IEC 29151:2017 | Information technology — Security techniques — Code of practice for personally identifiable information protection |
| INCITS/ISO/IEC 20889:2018 (2019) | Privacy enhancing data de-identification terminology and classification of techniques |
| INCITS/ISO/IEC 27018:2019(2019) | Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
| ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
| ISO/IEC 16509:1999 | Information technology — Year 2000 terminology |
| ISO/IEC 29151:2017 | Information technology — Security techniques — Code of practice for personally identifiable information protection |
| ISO 31000:2009 | Risk management — Principles and guidelines |
| ISO 722:1991 | Rock drilling equipment — Hollow drill steels in bar form, hexagonal and round |
| ISO/IEC 27002:2013 | Information technology — Security techniques — Code of practice for information security controls |
| ISO 14300-1:2011 | Space systems — Programme management — Part 1: Structuring of a project |
| ISO/IEC 27005:2011 | Information technology — Security techniques — Information security risk management |
| ISO 22307:2008 | Financial services — Privacy impact assessment |
| ISO 9000:2015 | Quality management systems — Fundamentals and vocabulary |
| ISO 21500:2012 | Guidance on project management |
| ISO/IEC 27000:2016 | Information technology — Security techniques — Information security management systems — Overview and vocabulary |
| ISO Guide 73:2009 | Risk management — Vocabulary |
| SA/SNZ TS ISO/IEC 20748.4:2020 | Information technology for learning, education and training - Learning analytics interoperability Privacy and data protection policies |
| ISO/IEC 29100:2011 | Information technology — Security techniques — Privacy framework |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.