{"id":401042,"date":"2024-10-20T04:54:00","date_gmt":"2024-10-20T04:54:00","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-7002-2022-2\/"},"modified":"2024-10-26T08:41:27","modified_gmt":"2024-10-26T08:41:27","slug":"ieee-7002-2022-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-7002-2022-2\/","title":{"rendered":"IEEE 7002-2022"},"content":{"rendered":"
New IEEE Standard – Active. The requirements for a systems\/software engineering process for privacy-oriented considerations regarding products, services, and systems utilizing employee, customer, or other external user\u2019s personal data are defined by this standard. Organizations and projects that are developing and deploying products, systems, processes, and applications that involve personal information are candidate users of the IEEE Std 7002\u2122 standard. Specific procedures, diagrams, and checklists are provided for users of the IEEE Std 7002 standard to perform conformity assessments on their specific privacy practices. Privacy impact assessments (PIAs) are described as a tool for both identifying where privacy controls and measures are needed and for confirming they are in place.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | IEEE Std 7002\u2122-2022 Front cover <\/td>\n<\/tr>\n | ||||||
2<\/td>\n | Title page <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Important Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 1.\u2002Overview 1.1\u2002Scope 1.2\u2002Purpose 1.3\u2002Word usage <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 2.\u2002Normative references 3.\u2002Definitions, acronyms, and abbreviations 3.1\u2002Definitions <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 3.2\u2002Acronyms and abbreviations 4.\u2002Process overview and scene setting 4.1\u2002Key terminology <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 4.2\u2002Guidance on using the standard 4.3\u2002High level process <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.\u2002Defining organizational privacy requirements 5.1\u2002Overview 5.2\u2002Regulatory context 5.3\u2002Additional contextual factors <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.\u2002Setting organizational privacy framework 6.1\u2002General <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.2\u2002Organizational policies, procedures, and guidelines <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.3\u2002Roles and responsibilities <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 6.4\u2002Training 6.5\u2002Governance and accountability functions <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 7.\u2002Characterizing the system environment 7.1\u2002Overview 7.2\u2002Business need <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 7.3\u2002System functionality and design <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 7.4\u2002Risk assessment <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 8.\u2002Privacy risk management 8.1\u2002Responding to risks in the proposed system environment <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 8.2\u2002Privacy controls for risk mitigation <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 8.3\u2002Ongoing system privacy risk management <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 9.\u2002Privacy in the systems development life cycle 9.1\u2002General <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 9.2\u2002Privacy life cycle management <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | Annex\u00a0A (informative) Examples A.1\u2002Examples from Clause\u00a05 A.2\u2002Examples from Clause\u00a06 <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | A.3\u2002Examples from Clause\u00a07 A.4\u2002Examples from Clause\u00a08 <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | A.5\u2002General resources <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | Annex\u00a0B (informative) Bibliography <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | Back cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Standard for Data Privacy Process<\/b><\/p>\n |