ISO 29100 - 2020 Sample
ISO 29100 - 2020 Sample
© CEN 2020 No copying without NSAI permission except as permitted by copyright law.
I.S. EN ISO/IEC 29100:2020&LC:2020
The National Standards Authority of Ireland (NSAI) produces the following categories of formal documents:
I.S. xxx: Irish Standard — national specification based on the consensus of an expert panel and subject to public consultation.
S.R. xxx: Standard Recommendation — recommendation based on the consensus of an expert panel and subject to public consultation.
SWiFT xxx: A rapidly developed recommendatory document based on the consensus of the participants of an NSAI workshop.
This is a free 21 page sample. Access the full version online.
This document replaces/revises/consolidates the NSAI adoption of the document(s) indicated on the
CEN/CENELEC cover/Foreword and the following National document(s):
NOTE: The date of any NSAI previous adoption may not match the date of its original CEN/CENELEC
document.
2020-09-08
NOTE: If blank see CEN/CENELEC cover page
This document does not purport to include all the necessary provisions of a contract. Users are responsible
for its correct application.
For relationships with other publications refer to the NSAI web store.
Compliance with this document does not of itself confer immunity from legal obligations.
This is a free 21 page sample. Access the full version online.
In line with international standards practice the decimal point is shown as a comma (,) throughout this
document.
This is a free 21 page sample. Access the full version online.
Correction Notice
Reference: EN ISO/IEC 29100:2020
Title: Information technology - Security techniques - Privacy framework (ISO/IEC 29100:2011, including
Amd 1:2018)
Brussels, 2020-07-01
Please include the following minor editorial correction(s) in the document related to:
English
French
German
for the following procedure :
PQ/UQ
Enquiry
2nd Enquiry
Parallel Enquiry
2nd Parallel Enquiry
Formal Vote
2nd Formal Vote
Parallel Formal Vote
2nd Parallel Formal Vote
UAP
TC Approval
2nd TC Approval
Publication
Parallel Publication
It has been brought to our attention that this document, issued on 2020-06-10, requires modification.
missing statement regarding the Amendment (the amendment is incorporated) in the foreword.
ICS 35.030
English version
- Cadre privé (ISO/IEC 29100:2011, y compris Amd Rahmenwerk für Datenschutz (ISO/IEC 29100:2011,
1:2018) einschließlich Amd 1:2018)
This European Standard was corrected and reissued by the CEN-CENELEC Management Centre on 1 July 2020.
CEN and CENELEC members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for
giving this European Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical
references concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to
any CEN and CENELEC member.
This European Standard exists in three official versions (English, French, German). A version in any other language made by
translation under the responsibility of a CEN and CENELEC member into its own language and notified to the CEN-CENELEC
Management Centre has the same status as the official versions.
CEN and CENELEC members are the national standards bodies and national electrotechnical committees of Austria, Belgium,
Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy,
Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of North Macedonia, Romania, Serbia,
Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom.
© 2020 CEN/CENELEC All rights of exploitation in any form and by any means Ref. No. EN ISO/IEC 29100:2020 E
reserved worldwide for CEN national Members and for
CENELEC Members.
I.S. EN ISO/IEC 29100:2020&LC:2020
EN ISO/IEC 29100:2020 (E)
Contents Page
European foreword....................................................................................................................................................... 3
This is a free 21 page sample. Access the full version online.
2
I.S. EN ISO/IEC 29100:2020&LC:2020
EN ISO/IEC 29100:2020 (E)
European foreword
The text of ISO/IEC 29100:2011, including Amd 1:2018 has been prepared by Technical Committee
ISO/IEC JTC 1 "Information technology” of the International Organization for Standardization (ISO) and
has been taken over as EN ISO/IEC 29100:2020 by Technical Committee CEN/CLC/JTC 13
“Cybersecurity and Data Protection” the secretariat of which is held by DIN.
This European Standard shall be given the status of a national standard, either by publication of an
identical text or by endorsement, at the latest by December 2020, and conflicting national standards
shall be withdrawn at the latest by December 2020.
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CEN shall not be held responsible for identifying any or all such patent rights.
This is a free 21 page sample. Access the full version online.
According to the CEN-CENELEC Internal Regulations, the national standards organizations of the
following countries are bound to implement this European Standard: Austria, Belgium, Bulgaria,
Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland,
Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of
North Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the
United Kingdom.
Endorsement notice
The text of ISO/IEC 29100:2011, including Amd 1:2018 has been approved by CEN as
EN ISO/IEC 29100:2020 without any modification.
3
This is a free 21 page sample. Access the full version online.
INTERNATIONAL ISO/IEC
STANDARD 29100
First edition
2011-12-15
AMENDMENT 1
2018-06
Reference number
ISO/IEC 29100:2011/Amd.1:2018(E)
© ISO/IEC 2018
I.S. EN ISO/IEC 29100:2020&LC:2020
ISO/IEC 29100:2011/Amd.1:2018(E)
This is a free 21 page sample. Access the full version online.
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical
activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work. In the field of information technology, ISO and IEC have established a joint technical committee,
ISO/IEC JTC 1.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for
the different types of document should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives).
This is a free 21 page sample. Access the full version online.
Attention is drawn to the possibility that some of the elements of this document may be the subject
of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent
rights. Details of any patent rights identified during the development of the document will be in the
Introduction and/or on the ISO list of patent declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation on the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to the
World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see the following
URL: www.iso.org/iso/foreword.html.
This document was prepared by Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, IT Security techniques.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www.iso.org/members.html.
INTERNATIONAL ISO/IEC
STANDARD 29100
First edition
2011-12-15
This is a free 21 page sample. Access the full version online.
Reference number
ISO/IEC 29100:2011(E)
© ISO/IEC 2011
I.S. EN ISO/IEC 29100:2020&LC:2020
ISO/IEC 29100:2011(E)
This is a free 21 page sample. Access the full version online.
Contents Page
Foreword ............................................................................................................................................................. v
Introduction ........................................................................................................................................................ vi
1 Scope ...................................................................................................................................................... 1
2 Terms and definitions ........................................................................................................................... 1
3 Symbols and abbreviated terms .......................................................................................................... 4
4 Basic elements of the privacy framework........................................................................................... 5
This is a free 21 page sample. Access the full version online.
Figures
Tables
Table 1 – Possible flows of PII among the PII principal, PII controller, PII processor and a third party and their
roles 7
Table A.1 – Matching ISO/IEC 29100 concepts to ISO/IEC 27000 concepts 20
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are members of
ISO or IEC participate in the development of International Standards through technical committees
established by the respective organization to deal with particular fields of technical activity. ISO and IEC
technical committees collaborate in fields of mutual interest. Other international organizations, governmental
and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information
technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
This is a free 21 page sample. Access the full version online.
The main task of the joint technical committee is to prepare International Standards. Draft International
Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as
an International Standard requires approval by at least 75 % of the national bodies casting a vote.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights.
ISO/IEC 29100 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, IT Security techniques.
Introduction
This International Standard provides a high-level framework for the protection of personally
identifiable information (PII) within information and communication technology (ICT) systems. It is
general in nature and places organizational, technical, and procedural aspects in an overall privacy
framework.
The privacy framework is intended to help organizations define their privacy safeguarding
requirements related to PII within an ICT environment by:
This is a free 21 page sample. Access the full version online.
The increasing commercial use and value of PII, the sharing of PII across legal jurisdictions, and the
growing complexity of ICT systems, can make it difficult for an organization to ensure privacy and to
achieve compliance with the various applicable laws. Privacy stakeholders can prevent uncertainty
and distrust from arising by handling privacy matters properly and avoiding cases of PII misuse.
- aid in the design, implementation, operation, and maintenance of ICT systems that handle and protect
PII;
- spur innovative solutions to enable the protection of PII within ICT systems; and
- improve organizations’ privacy programs through the use of best practices.
The privacy framework provided within this International Standard can serve as a basis for additional
privacy standardization initiatives, such as for:
Some jurisdictions might require compliance with one or more of the documents referenced in
ISO/IEC JTC 1/SC 27 WG 5 Standing Document 2 (WG 5 SD2) — Official Privacy Documents
References [3] or with other applicable laws and regulations, but this International Standard is not
intended to be a global model policy, nor a legislative framework.
1 Scope
This International Standard is applicable to natural persons and organizations involved in specifying,
procuring, architecting, designing, developing, testing, maintaining, administering, and operating
information and communication technology systems or services where privacy controls are required
for the processing of PII.
For the purposes of this document, the following terms and definitions apply.
NOTE In order to make it easier to use the ISO/IEC 27000 family of International Standards in the specific context of
privacy and to integrate privacy concepts in the ISO/IEC 27000 context, the table in Annex A provides the ISO/IEC 27000
concepts that correspond with the ISO/IEC 29100 concepts used in this International Standard.
2.1
anonymity
characteristic of information that does not permit a personally identifiable information principal to be
identified directly or indirectly
2.2
anonymization
process by which personally identifiable information (PII) is irreversibly altered in such a way that a
PII principal can no longer be identified directly or indirectly, either by the PII controller alone or in
collaboration with any other party
2.3
anonymized data
data that has been produced as the output of a personally identifiable information anonymization
process
2.4
consent
personally identifiable information (PII) principal’s freely given, specific and informed agreement to
the processing of their PII