Cybersecurity — IoT security and privacy — Cybersecurity labelling framework for consumer IoT
This document defines a Universal Cybersecurity Labelling Framework for the development and implementation of cybersecurity labelling programmes for consumer IoT products and includes guidance on the following topics:
• Risks and threats associated with consumer IoT products;
• Stakeholders, roles and responsibilities;
• Relevant standards and guidance documents;
• Conformity assessment options…
Information technology — Business operational view — Part 8: Identification of privacy protection re...
ISO/IEC 15944-8:2012 has been developed to support modelling generic international requirements for identifying and providing privacy protection of personal information throughout any kind of information and communications technology (ICT) based business transaction where the individual has the role of a buyer. It provides users and designers with a methodology and tools addressing requirements…
Information security, cybersecurity and privacy protection — Security and privacy requirements for a...
This document provides high level security and privacy requirements for authentication using biometrics on mobile devices, including security and privacy requirements for functional components, for communication, for storage and for remote processing.
This document is applicable to remote modes, i.e., the cases that:
- the biometric sample is captured through mobile devices;
- the biometric…
Information security, cybersecurity and privacy protection — Guidelines on privacy preservation base...
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy
by reducing the risks associated with the sharing or transmission of personal data between
organisations and users by minimizing the information shared. It will include several ZKP
functional requirements relevant to a range of different business use cases, then describes
how different ZKP models can be used…
Information technology — Business operational view — Part 12: Privacy protection requirements (PPR) ...
This document:
— provides method(s) for identifying, in Open-edi modelling technologies and development of scenarios, the additional requirements in business operational view (BOV) specifications for identifying the additional external constraints to be applied to recorded information in business transactions relating to personal information of an individual, as required by legal and…
Information security, cybersecurity and privacy protection – Controls and guidance for personally id...
This Recommendation | International Standard establishes controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).
In particular, this Recommendation | International Standard specifies guidance based on ISO/IEC 27002, taking into consideration the controls…
Information security, cybersecurity and privacy protection — Requirements for the competence of IT s...
ISO/IEC 19896-1:2018 defines terms and establishes an organized set of concepts and relationships to understand the competency requirements for information security assurance conformance-testing and evaluation specialists, thereby establishing a basis for shared understanding of the concepts and principles central to the ISO/IEC 19896 series across its user communities. It provides fundamental…
Information security, cybersecurity and privacy protection — Requirements for the competence of IT s...
This document provides the minimum requirements for the knowledge, skills and effectiveness requirements of individuals performing testing activities for a conformance scheme using ISO/IEC 19790 and ISO/IEC 24759.
Privacy protection — Guidance on the use of models for privacy engineering
This document provides guidance on how to use modelling in privacy engineering.
It describes categories of models that can be used, the use of modelling to support engineering, and
the relationships with other references and standards for privacy engineering and for modelling.
It provides high-level use cases describing how models are used.