ISO/IEC 29134:2017
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Information technology — Security techniques — Guidelines for privacy impact assessment
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
08-05-2023
French, English
28-06-2017
This document gives guidelines for
— a process on privacy impact assessments, and
— a structure and content of a PIA report.
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.
Committee |
ISO/IEC JTC 1/SC 27
|
DocumentType |
Standard
|
Pages |
47
|
PublisherName |
International Organization for Standardization
|
Status |
Superseded
|
SupersededBy |
Standards | Relationship |
DIN EN ISO/IEC 29134:2020-09 | Identical |
PN-ISO/IEC 29134:2018-11 | Identical |
NS-ISO/IEC 29134 : 2017 | Identical |
I.S. EN ISO/IEC 29134:2020&LC:2020 | Identical |
UNI CEI EN ISO/IEC 29134:2020 | Identical |
CEI UNI EN ISO/IEC 29134 : 2020 | Identical |
ÖVE/ÖNORM EN ISO/IEC 29134:2020 09 15 | Identical |
PN-EN ISO/IEC 29134:2020-09 | Identical |
NEN ISO/IEC 29134 : 2017 | Identical |
BS ISO/IEC 29134:2017 | Identical |
EN ISO/IEC 29134:2020 | Identical |
BS EN ISO/IEC 29134:2020 | Identical |
SS-EN ISO/IEC 29134:2020 | Identical |
I.S. EN ISO 29134:2020 | Identical |
NEN-EN-ISO/IEC 29134:2020 | Identical |
JIS X 9251:2021 | Identical |
INCITS/ISO/IEC 29134:2017(2019) | Identical |
EN ISO 29134:2020 | Identical |
ABNT NBR ISO/IEC 29134:2020 | Identical |
UNE-EN ISO/IEC 29134:2020 | Identical |
17/30318701 DC : 0 | BS ISO/IEC 19286 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PRIVACY-ENHANCING PROTOCOLS AND SERVICES |
ISO/IEC 27018:2014 | Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
CSA ISO/IEC 27018 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS |
BS ISO/IEC 29151:2017 | Information technology. Security techniques. Code of practice for personally identifiable information protection |
18/30331887 DC : 0 | BS ISO/IEC 20889 - INFORMATION TECHNOLOGY- SECURITY TECHNIQUES - PRIVACY ENHANCING DATA DE-IDENTIFICATION TECHNIQUES |
ISO/IEC 19286:2018 | Identification cards — Integrated circuit cards — Privacy-enhancing protocols and services |
BS ISO/IEC 19286:2018 | Identification cards. Integrated circuit cards. Privacy-enhancing protocols and services |
BS ISO/IEC 27018:2014 | Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
ISO/IEC 24760-3:2016 | Information technology — Security techniques — A framework for identity management — Part 3: Practice |
13/30266767 DC : 0 | BS ISO/IEC 27018 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR P2 PROTECTION IN PUBLIC CLOUD ACTING AS P2 PROCESSORS |
DIN ISO/IEC 27018:2017-08 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS (ISO/IEC 27018:2014) |
ISO/IEC 29151:2017 | Information technology — Security techniques — Code of practice for personally identifiable information protection |
CAN/CSA-ISO/IEC 24760-3:18 | Information technology — Security techniques — A framework for identity management — Part 3: Practice (Adopted ISO/IEC 24760-3:2016, first edition, 2016-08-01) |
ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
ISO/IEC 16509:1999 | Information technology Year 2000 terminology |
ISO/IEC 29151:2017 | Information technology — Security techniques — Code of practice for personally identifiable information protection |
ISO 31000:2009 | Risk management Principles and guidelines |
ISO 722:1991 | Rock drilling equipment — Hollow drill steels in bar form, hexagonal and round |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
ISO 14300-1:2011 | Space systems — Programme management — Part 1: Structuring of a project |
ISO/IEC 27005:2011 | Information technology Security techniques Information security risk management |
ISO 22307:2008 | Financial services — Privacy impact assessment |
ISO 9000:2015 | Quality management systems — Fundamentals and vocabulary |
ISO 21500:2012 | Guidance on project management |
ISO/IEC 27000:2016 | Information technology Security techniques Information security management systems Overview and vocabulary |
ISO Guide 73:2009 | Risk management — Vocabulary |
SA/SNZ TS ISO/IEC 20748.4:2020 | Information technology for learning, education and training - Learning analytics interoperability Privacy and data protection policies |
ISO/IEC 29100:2011 | Information technology — Security techniques — Privacy framework |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.