0% found this document useful (0 votes)
1K views22 pages

ISO 29100 - 2020 Sample

Uploaded by

Mrsmart Smart
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views22 pages

ISO 29100 - 2020 Sample

Uploaded by

Mrsmart Smart
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Irish Standard

I.S. EN ISO/IEC 29100:2020&LC:2020

Information technology - Security


techniques - Privacy framework (ISO/IEC
This is a free 21 page sample. Access the full version online.

29100:2011, including Amd 1:2018)

© CEN 2020 No copying without NSAI permission except as permitted by copyright law.
I.S. EN ISO/IEC 29100:2020&LC:2020

Incorporating amendments/corrigenda/National Annexes issued since publication:

The National Standards Authority of Ireland (NSAI) produces the following categories of formal documents:
I.S. xxx: Irish Standard — national specification based on the consensus of an expert panel and subject to public consultation.

S.R. xxx: Standard Recommendation — recommendation based on the consensus of an expert panel and subject to public consultation.
SWiFT xxx: A rapidly developed recommendatory document based on the consensus of the participants of an NSAI workshop.
This is a free 21 page sample. Access the full version online.

This document replaces/revises/consolidates the NSAI adoption of the document(s) indicated on the
CEN/CENELEC cover/Foreword and the following National document(s):

NOTE: The date of any NSAI previous adoption may not match the date of its original CEN/CENELEC
document.

This document is based on: Published:

This document was published ICS number:


under the authority of the NSAI
and comes into effect on: 35.030

2020-09-08
NOTE: If blank see CEN/CENELEC cover page

NSAI T +353 1 807 3800 Sales:


1 Swift Square, F +353 1 807 3838 T +353 1 857 6730
Northwood, Santry E [email protected] F +353 1 857 6729
Dublin 9 W NSAI.ie W standards.ie

Údarás um Chaighdeáin Náisiúnta na hÉireann


National Foreword
I.S. EN ISO/IEC 29100:2020&LC:2020 is the adopted Irish version of the European Document EN ISO/IEC
29100:2020, Information technology - Security techniques - Privacy framework (ISO/IEC 29100:2011,
including Amd 1:2018)

This document does not purport to include all the necessary provisions of a contract. Users are responsible
for its correct application.

For relationships with other publications refer to the NSAI web store.

Compliance with this document does not of itself confer immunity from legal obligations.
This is a free 21 page sample. Access the full version online.

In line with international standards practice the decimal point is shown as a comma (,) throughout this
document.
This is a free 21 page sample. Access the full version online.

This page is intentionally left blank


I.S. EN ISO/IEC 29100:2020&LC:2020

Correction Notice
Reference: EN ISO/IEC 29100:2020
Title: Information technology - Security techniques - Privacy framework (ISO/IEC 29100:2011, including
Amd 1:2018)

Work Item: JT013028

Brussels, 2020-07-01

Please include the following minor editorial correction(s) in the document related to:

the following language version(s) :


This is a free 21 page sample. Access the full version online.

English
French
German
for the following procedure :
PQ/UQ
Enquiry
2nd Enquiry
Parallel Enquiry
2nd Parallel Enquiry
Formal Vote
2nd Formal Vote
Parallel Formal Vote
2nd Parallel Formal Vote
UAP
TC Approval
2nd TC Approval
Publication
Parallel Publication

It has been brought to our attention that this document, issued on 2020-06-10, requires modification.

missing statement regarding the Amendment (the amendment is incorporated) in the foreword.

Please find enclosed the updated English and French version.

We apologise for any inconvenience this may cause.

STD3/FO004 (November 2017)


Rue de la Science, 23 • 1040 Bruxelles
Tel : +32 2 550 08 11 • Fax : +32 2 550 08 19
I.S. EN ISO/IEC 29100:2020&LC:2020
This is a free 21 page sample. Access the full version online.

This page is intentionally left BLANK.


I.S. EN ISO/IEC 29100:2020&LC:2020

EUROPEAN STANDARD EN ISO/IEC 29100


NORME EUROPÉENNE
EUROPÄISCHE NORM June 2020

ICS 35.030

English version

Information technology - Security techniques - Privacy


framework (ISO/IEC 29100:2011, including Amd 1:2018)
Technologies de l'information - Techniques de sécurité Informationstechnik - Sicherheitsverfahren -
This is a free 21 page sample. Access the full version online.

- Cadre privé (ISO/IEC 29100:2011, y compris Amd Rahmenwerk für Datenschutz (ISO/IEC 29100:2011,
1:2018) einschließlich Amd 1:2018)

This European Standard was approved by CEN on 31 May 2020.

This European Standard was corrected and reissued by the CEN-CENELEC Management Centre on 1 July 2020.

CEN and CENELEC members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for
giving this European Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical
references concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to
any CEN and CENELEC member.

This European Standard exists in three official versions (English, French, German). A version in any other language made by
translation under the responsibility of a CEN and CENELEC member into its own language and notified to the CEN-CENELEC
Management Centre has the same status as the official versions.

CEN and CENELEC members are the national standards bodies and national electrotechnical committees of Austria, Belgium,
Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy,
Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of North Macedonia, Romania, Serbia,
Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom.

CEN-CENELEC Management Centre:


Rue de la Science 23, B-1040 Brussels

© 2020 CEN/CENELEC All rights of exploitation in any form and by any means Ref. No. EN ISO/IEC 29100:2020 E
reserved worldwide for CEN national Members and for
CENELEC Members.
I.S. EN ISO/IEC 29100:2020&LC:2020
EN ISO/IEC 29100:2020 (E)

Contents Page

European foreword....................................................................................................................................................... 3
This is a free 21 page sample. Access the full version online.

2
I.S. EN ISO/IEC 29100:2020&LC:2020
EN ISO/IEC 29100:2020 (E)

European foreword

The text of ISO/IEC 29100:2011, including Amd 1:2018 has been prepared by Technical Committee
ISO/IEC JTC 1 "Information technology” of the International Organization for Standardization (ISO) and
has been taken over as EN ISO/IEC 29100:2020 by Technical Committee CEN/CLC/JTC 13
“Cybersecurity and Data Protection” the secretariat of which is held by DIN.

This European Standard shall be given the status of a national standard, either by publication of an
identical text or by endorsement, at the latest by December 2020, and conflicting national standards
shall be withdrawn at the latest by December 2020.

Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CEN shall not be held responsible for identifying any or all such patent rights.
This is a free 21 page sample. Access the full version online.

According to the CEN-CENELEC Internal Regulations, the national standards organizations of the
following countries are bound to implement this European Standard: Austria, Belgium, Bulgaria,
Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland,
Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of
North Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the
United Kingdom.

Endorsement notice

The text of ISO/IEC 29100:2011, including Amd 1:2018 has been approved by CEN as
EN ISO/IEC 29100:2020 without any modification.

3
This is a free 21 page sample. Access the full version online.

This page is intentionally left blank


I.S. EN ISO/IEC 29100:2020&LC:2020

INTERNATIONAL ISO/IEC
STANDARD 29100

First edition
2011-12-15
AMENDMENT 1
2018-06

Information technology — Security


This is a free 21 page sample. Access the full version online.

techniques — Privacy framework


AMENDMENT 1: Clarifications
Technologies de l'information — Techniques de sécurité — Cadre privé
AMENDEMENT 1: Clarifications

Reference number
ISO/IEC 29100:2011/Amd.1:2018(E)

© ISO/IEC 2018
I.S. EN ISO/IEC 29100:2020&LC:2020
ISO/IEC 29100:2011/Amd.1:2018(E)

This is a free 21 page sample. Access the full version online.

COPYRIGHT PROTECTED DOCUMENT


© ISO/IEC 2018
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting
on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address
below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Fax: +41 22 749 09 47
Email: [email protected]
Website: www.iso.org
Published in Switzerland

ii  © ISO/IEC 2018 – All rights reserved


I.S. EN ISO/IEC 29100:2020&LC:2020
ISO/IEC 29100:2011/Amd.1:2018(E)


Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical
activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work. In the field of information technology, ISO and IEC have established a joint technical committee,
ISO/IEC JTC 1.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part  1. In particular the different approval criteria needed for
the different types of document should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www​.iso​.org/directives).
This is a free 21 page sample. Access the full version online.

Attention is drawn to the possibility that some of the elements of this document may be the subject
of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent
rights. Details of any patent rights identified during the development of the document will be in the
Introduction and/or on the ISO list of patent declarations received (see www​.iso​.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation on the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to the
World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see the following
URL: www​.iso​.org/iso/foreword​.html.
This document was prepared by Technical Committee ISO/IEC  JTC  1, Information technology,
Subcommittee SC 27, IT Security techniques.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www​.iso​.org/members​.html.

© ISO/IEC 2018 – All rights reserved  iii


This is a free 21 page sample. Access the full version online.
I.S. EN ISO/IEC 29100:2020&LC:2020
I.S. EN ISO/IEC 29100:2020&LC:2020

INTERNATIONAL ISO/IEC
STANDARD 29100

First edition
2011-12-15
This is a free 21 page sample. Access the full version online.

Information technology — Security


techniques — Privacy framework
Technologies de l'information — Techniques de sécurité — Cadre privé

Reference number
ISO/IEC 29100:2011(E)

© ISO/IEC 2011
I.S. EN ISO/IEC 29100:2020&LC:2020
ISO/IEC 29100:2011(E)
This is a free 21 page sample. Access the full version online.

COPYRIGHT PROTECTED DOCUMENT


© ISO/IEC 2011
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or
ISO's member body in the country of the requester.
ISO copyright office
Case postale 56  CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail [email protected]
Web www.iso.org
Published in Switzerland

ii © ISO/IEC 2011 – All rights reserved


I.S. EN ISO/IEC 29100:2020&LC:2020
ISO/IEC 29100:2011(E)

Contents Page

Foreword ............................................................................................................................................................. v 
Introduction ........................................................................................................................................................ vi 
1  Scope ...................................................................................................................................................... 1 
2  Terms and definitions ........................................................................................................................... 1 
3  Symbols and abbreviated terms .......................................................................................................... 4 
4  Basic elements of the privacy framework........................................................................................... 5 
This is a free 21 page sample. Access the full version online.

4.1  Overview of the privacy framework ..................................................................................................... 5 


4.2  Actors and roles .................................................................................................................................... 5 
4.2.1  PII principals .......................................................................................................................................... 5 
4.2.2  PII controllers......................................................................................................................................... 5 
4.2.3  PII processors ........................................................................................................................................ 5 
4.2.4  Third parties ........................................................................................................................................... 6 
4.3  Interactions ............................................................................................................................................ 6 
4.4  Recognizing PII ...................................................................................................................................... 7 
4.4.1  Identifiers ............................................................................................................................................... 7 
4.4.2  Other distinguishing characteristics ................................................................................................... 7 
4.4.3  Information which is or might be linked to a PII principal ................................................................ 8 
4.4.4  Pseudonymous data ............................................................................................................................. 9 
4.4.5  Metadata ................................................................................................................................................. 9 
4.4.6  Unsolicited PII ........................................................................................................................................ 9 
4.4.7  Sensitive PII ........................................................................................................................................... 9 
4.5  Privacy safeguarding requirements .................................................................................................. 10 
4.5.1  Legal and regulatory factors .............................................................................................................. 11 
4.5.2  Contractual factors.............................................................................................................................. 11 
4.5.3  Business factors.................................................................................................................................. 12 
4.5.4  Other factors ........................................................................................................................................ 12 
4.6  Privacy policies ................................................................................................................................... 13 
4.7  Privacy controls................................................................................................................................... 13 
5  The privacy principles of ISO/IEC 29100 ........................................................................................... 14 
5.1  Overview of privacy principles .......................................................................................................... 14 
5.2  Consent and choice ............................................................................................................................ 14 
5.3  Purpose legitimacy and specification ............................................................................................... 15 
5.4  Collection limitation ............................................................................................................................ 15 
5.5  Data minimization ................................................................................................................................ 16 
5.6  Use, retention and disclosure limitation ........................................................................................... 16 
5.7  Accuracy and quality .......................................................................................................................... 16 
5.8  Openness, transparency and notice ................................................................................................. 17 
5.9  Individual participation and access................................................................................................... 17 
5.10  Accountability ...................................................................................................................................... 18 
5.11  Information security ............................................................................................................................ 18 
5.12  Privacy compliance ............................................................................................................................. 19 
Annex A (informative) Correspondence between ISO/IEC 29100 concepts and ISO/IEC 27000
concepts ............................................................................................................................................... 20 
Bibliography ...................................................................................................................................................... 21 

© ISO/IEC 2011 – All rights reserved iii


I.S. EN ISO/IEC 29100:2020&LC:2020
ISO/IEC 29100:2011(E)

Figures

Figure 1 – Factors influencing privacy risk management .................................................................................. 11

Tables

Table 1 – Possible flows of PII among the PII principal, PII controller, PII processor and a third party and their
roles 7 

Table 2 – Example of attributes that can be used to identify natural persons 8 

Table 3 – The privacy principles of ISO/IEC 29100 14 


This is a free 21 page sample. Access the full version online.

Table A.1 – Matching ISO/IEC 29100 concepts to ISO/IEC 27000 concepts 20 

iv © ISO/IEC 2011 – All rights reserved


I.S. EN ISO/IEC 29100:2020&LC:2020
ISO/IEC 29100:2011(E)

Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are members of
ISO or IEC participate in the development of International Standards through technical committees
established by the respective organization to deal with particular fields of technical activity. ISO and IEC
technical committees collaborate in fields of mutual interest. Other international organizations, governmental
and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information
technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.

International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
This is a free 21 page sample. Access the full version online.

The main task of the joint technical committee is to prepare International Standards. Draft International
Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as
an International Standard requires approval by at least 75 % of the national bodies casting a vote.

Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights.

ISO/IEC 29100 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, IT Security techniques.

© ISO/IEC 2011 – All rights reserved v


I.S. EN ISO/IEC 29100:2020&LC:2020
ISO/IEC 29100:2011(E)

Introduction

This International Standard provides a high-level framework for the protection of personally
identifiable information (PII) within information and communication technology (ICT) systems. It is
general in nature and places organizational, technical, and procedural aspects in an overall privacy
framework.

The privacy framework is intended to help organizations define their privacy safeguarding
requirements related to PII within an ICT environment by:
This is a free 21 page sample. Access the full version online.

- specifying a common privacy terminology;


- defining the actors and their roles in processing PII;
- describing privacy safeguarding requirements; and
- referencing known privacy principles.

In some jurisdictions, this International Standard’s references to privacy safeguarding requirements


might be understood as being complementary to legal requirements for the protection of PII. Due to
the increasing number of information and communication technologies that process PII, it is
important to have international information security standards that provide a common understanding
for the protection of PII. This International Standard is intended to enhance existing security
standards by adding a focus relevant to the processing of PII.

The increasing commercial use and value of PII, the sharing of PII across legal jurisdictions, and the
growing complexity of ICT systems, can make it difficult for an organization to ensure privacy and to
achieve compliance with the various applicable laws. Privacy stakeholders can prevent uncertainty
and distrust from arising by handling privacy matters properly and avoiding cases of PII misuse.

Use of this International Standard will:

- aid in the design, implementation, operation, and maintenance of ICT systems that handle and protect
PII;
- spur innovative solutions to enable the protection of PII within ICT systems; and
- improve organizations’ privacy programs through the use of best practices.

The privacy framework provided within this International Standard can serve as a basis for additional
privacy standardization initiatives, such as for:

- a technical reference architecture;


- the implementation and use of specific privacy technologies and overall privacy management;
- privacy controls for outsourced data processes;
- privacy risk assessments; or
- specific engineering specifications.

Some jurisdictions might require compliance with one or more of the documents referenced in
ISO/IEC JTC 1/SC 27 WG 5 Standing Document 2 (WG 5 SD2) — Official Privacy Documents
References [3] or with other applicable laws and regulations, but this International Standard is not
intended to be a global model policy, nor a legislative framework.

vi © ISO/IEC 2011 – All rights reserved


I.S. EN ISO/IEC 29100:2020&LC:2020

INTERNATIONAL STANDARD ISO/IEC 29100:2011(E)

Information technology — Security techniques — Privacy


framework

1 Scope

This International Standard provides a privacy framework which


This is a free 21 page sample. Access the full version online.

- specifies a common privacy terminology;


- defines the actors and their roles in processing personally identifiable information (PII);
- describes privacy safeguarding considerations; and
- provides references to known privacy principles for information technology.

This International Standard is applicable to natural persons and organizations involved in specifying,
procuring, architecting, designing, developing, testing, maintaining, administering, and operating
information and communication technology systems or services where privacy controls are required
for the processing of PII.

2 Terms and definitions

For the purposes of this document, the following terms and definitions apply.
NOTE In order to make it easier to use the ISO/IEC 27000 family of International Standards in the specific context of
privacy and to integrate privacy concepts in the ISO/IEC 27000 context, the table in Annex A provides the ISO/IEC 27000
concepts that correspond with the ISO/IEC 29100 concepts used in this International Standard.

2.1
anonymity
characteristic of information that does not permit a personally identifiable information principal to be
identified directly or indirectly

2.2
anonymization
process by which personally identifiable information (PII) is irreversibly altered in such a way that a
PII principal can no longer be identified directly or indirectly, either by the PII controller alone or in
collaboration with any other party

2.3
anonymized data
data that has been produced as the output of a personally identifiable information anonymization
process

2.4
consent
personally identifiable information (PII) principal’s freely given, specific and informed agreement to
the processing of their PII

© ISO/IEC 2011 – All rights reserved 1


This is a free preview. Purchase the entire publication at the link below:

I.S. EN ISO/IEC 29100 : 2020 : INC : LC : 2020 : EN


: COMBINED PDF
This is a free 21 page sample. Access the full version online.

Looking for additional Standards? Visit SAI Global Infostore


Learn about LexConnect, All Jurisdictions, Standards referenced in Australian legislation

Need to speak with a Customer Service Representative - Contact Us

You might also like