{"id":408555,"date":"2024-10-20T05:31:16","date_gmt":"2024-10-20T05:31:16","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-275562022\/"},"modified":"2024-10-26T10:03:26","modified_gmt":"2024-10-26T10:03:26","slug":"bs-iso-iec-275562022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-275562022\/","title":{"rendered":"BS ISO\/IEC 27556:2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 \u200bScope 2 \u200bNormative references 3 \u200bTerms and definitions <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 4 \u200bSymbols and abbreviated terms 5 \u200bUser-centric framework for handling PII 5.1 \u200bGeneral <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.2 \u200bActors 5.3 \u200bRoles of actors in user-centric PII handling frameworks 5.3.1 \u200bRoles of PII principals 5.3.2 \u200bRoles of PII controllers 5.3.3 \u200bRoles of PII processors <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.3.4 \u200bRoles of privacy preference administrators 5.4 \u200bComponents in the user-centric PII handling framework 5.4.1 \u200bOverview 5.4.2 \u200bData collection 5.4.3 \u200bData transformation(s) 5.4.4 \u200bPII transfer control <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.4.5 \u200bPII recipient 5.4.6 \u200bPrivacy preference manager <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.5 \u200bRelationship between actors and components <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6 \u200bRequirements and recommendations for the privacy preference manager 6.1 \u200bOverview 6.2 \u200bPrivacy impact assessment 6.3 \u200bFunctional recommendations <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6.4 \u200bRequirements for life cycle management of privacy preferences 7 \u200bFurther considerations for the PPM in a privacy information management system <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Annex A (informative) Use cases of PII handling based on privacy preferences <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | Annex B (informative) Identifying an actor serving as a component for each example service <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Annex C (informative) Guidance on configuration of privacy preferences management <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Annex D (informative) Supporting the design of a privacy preference management <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information security, cybersecurity and privacy protection. User-centric privacy preferences management framework<\/b><\/p>\n |