Information technology — Online privacy notices and consent
1 Scope
This document specifies controls which shape the content and the structure of online privacy notices as well as the process of asking for consent to collect and process personally identifiable information (PII) from PII principals.
This document is applicable in any online context where a PII controller or any other entity processing PII informs PII principals of processing.
Requirements for bodies providing audit and certification of information security management systems...
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS…
Requirements for bodies providing audit and certification of information security management systems...
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS…
Information technology, cybersecurity and privacy protection - Cybersecurity framework development g...
This document specifies guidelines for developing a cybersecurity framework. It is applicable to cybersecurity framework creators regardless of their organizations' type, size or nature.
Information technology, cybersecurity and privacy protection — Cybersecurity framework development g...
This document specifies guidelines for developing a cybersecurity framework. It is applicable to cybersecurity framework creators regardless of their organizations' type, size or nature.
Privacy protection - Privacy guidelines for smart cities
The document takes a multiple agency as well as a citizen-centric viewpoint.
It provides guidance on:
— smart city ecosystem privacy protection;
— how standards can be used at a global level and at an organizational level for the benefit of citizens; and
— processes for smart city ecosystem privacy protection.
This document is applicable to all types and sizes of organizations,…
Privacy protection — Privacy guidelines for smart cities
The document takes a multiple agency as well as a citizen-centric viewpoint.
It provides guidance on:
— smart city ecosystem privacy protection;
— how standards can be used at a global level and at an organizational level for the benefit of citizens; and
— processes for smart city ecosystem privacy protection.
This document is applicable to all types and sizes of organizations,…
Information security, cybersecurity and privacy protection — Governance of information security
This document provides guidance on concepts, objectives and processes for the governance of information security, by which organizations can evaluate, direct, monitor and communicate the information security-related processes within the organization.
The intended audience for this document is:
— governing body and top management;
— those who are responsible for evaluating, directing and…
Information security, cybersecurity and privacy protection - Governance of information security
This document provides guidance on concepts, objectives and processes for the governance of information security, by which organizations can evaluate, direct, monitor and communicate the information security-related processes within the organization.
The intended audience for this document is:
— governing body and top management;
— those who are responsible for evaluating, directing and…
Information security, cybersecurity and privacy protection — Physically unclonable functions — Part ...
This document specifies the security requirements for physically unclonable functions (PUFs). Specified security requirements concern the output properties, tamper-resistance and unclonability of a single and a batch of PUFs. Since it depends on the application which security requirements a PUF needs to meet, this documents also describes the typical use cases of a PUF.
Amongst PUF use cases,…