ImageVerifierCode 换一换
格式:PDF , 页数:38 ,大小:428KB ,
资源ID:1016560      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-1016560.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(PAS 74-2008 Internet safety Access control systems for the protection of children online Specification《因特网安全 儿童在线保护用访问控制系统 规范》.pdf)为本站会员(boatfragile160)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

PAS 74-2008 Internet safety Access control systems for the protection of children online Specification《因特网安全 儿童在线保护用访问控制系统 规范》.pdf

1、PAS 74:2008Internet safety Access control systems for the protection of children online SpecificationICS 35.040; 35.080NO COPYING WITHOUT BSI PERMISSION EXCEPT AS PERMITTED BY COPYRIGHT LAWPUBLICLY AVAILABLE SPECIFICATIONLicensed Copy: Wang Bin, ISO/EXCHANGE CHINA STANDARDS, 11/07/2008 03:21, Uncont

2、rolled Copy, (c) BSIPublishing and copyright informationThe BSI copyright notice displayed in this document indicates when the document was last issued. BSI 3 April 2008ISBN 978 0 580 49979 1Amendments issued since publicationAmd. no. Date Text affectedPAS 74:2008Licensed Copy: Wang Bin, ISO/EXCHANG

3、E CHINA STANDARDS, 11/07/2008 03:21, Uncontrolled Copy, (c) BSI BSI 2008 iPAS 74:2008ContentsForeword iiIntroduction 11 Scope 22 Terms and definitions 33 Abbreviations 64 Internet-based content 75 Internet-based communications 86 Security of settings 107 Installation and implementation including ini

4、tial configuration 108 Configuration 129 Maintenance 1210 Uninstall/removal 1311 System support 1412 Product description and user documentation 1413 User education materials 1714 Conformity declaration 18AnnexesAnnex A (normative) Overview of the test laboratory process 19Annex B (normative) Categor

5、ies of inappropriate content 20Annex C (normative) Criteria to be used for checking compliance against Clause 4: Internet-based content 23Annex D (normative) Criteria to be used for checking compliance against Clause 5: Internet-based communications 25Annex E (normative) Categories of Internet-based

6、 communication services 26Annex F (normative) Criteria to be used for checking compliance against Clause 6: Security of settings 26Annex G (normative) Criteria to be used for checking compliance against Clause 7: Installation 27Annex H (normative) Criteria to be used for checking compliance against

7、Clause 8: Configuration 28Annex I (normative) Criteria to be used for checking compliance against Clause 9: Maintenance 29Annex J (normative) Criteria to be used for checking compliance against Clause 10: Uninstall/removal 30Annex K (normative) Criteria to be used for checking compliance against Cla

8、use 11: System support 30Annex L (normative) Criteria to be used for checking compliance against Clause 12: Product description and user documentation 31Bibliography 33Summary of pagesThis document comprises a front cover, an inside front cover, pages i and ii, pages 1 to 33 and a back cover.License

9、d Copy: Wang Bin, ISO/EXCHANGE CHINA STANDARDS, 11/07/2008 03:21, Uncontrolled Copy, (c) BSIPAS 74:2008ii BSI 2008ForewordThis Publicly Available Specification (PAS) has been prepared by The British Standards Institution (BSI) in consultation with the Home Office and Ofcom and associated groups to p

10、rovide a specification for access control systems for the protection of children online.Acknowledgement is given to the following organizations that were involved in the development of this specification:Becta Borderware Technology BSI Product ServicesChild Exploitation and Online Protection Centre

11、(CEOP)Cyberpatrol from SurfControlThe Home OfficeThe Home Secretarys Task Force on Child Protection on the InternetIntertek Research and Performance TestingMicrosoftMobile Broadband GroupNCHOfcom (Office of Communications)The Childrens CharitiesIn this Publicly Available Specification, the word shal

12、l indicates a requirement. The word should indicates a recommendation. Paragraphs marked NOTE are for guidance in understanding or clarifying the associated requirement.This PAS has been prepared and published by BSI, which retains its ownership and copyright. BSI reserves the right to withdraw or a

13、mend this PAS on receipt of authoritative advice that it is appropriate to do so. This Publicly Available Specification will be reviewed at intervals not exceeding two years and any amendments arising from the review will be published in an amended Publicly Available Specification and publicized in

14、Update Standards. Feedback on this Publicly Available Specification and future work will be gratefully received. This specification is not intended to restrict new developments in design and materials.This Publicly Available Specification is not to be regarded as a British Standard. It will be withd

15、rawn if its content is published in, or as, a British Standard.This publication does not purport to include all the necessary provisions of a contract. Users are responsible for its correct application.Compliance with a Publicly Available Specification does not in itself confer immunity from legal o

16、bligations.Licensed Copy: Wang Bin, ISO/EXCHANGE CHINA STANDARDS, 11/07/2008 03:21, Uncontrolled Copy, (c) BSI BSI 2008 1PAS 74:2008IntroductionThe Home Secretarys Task Force for Child Protection on the Internet was created in 2001. Its aim is to make the UK the safest place in the world for childre

17、n to use the Internet and to help protect children across the world from abuse fuelled by criminal misuse of new technologies. The Task Force brings together representatives from law enforcement agencies, child protection organizations, the Internet industry, Government and representatives from oppo

18、sition parties.The Task Forces work to date includes the development of models of good practice for providers of Internet chat, instant messaging, web-based services and search services, guidance on the moderation of interactive services, and is currently developing good practice guidance for provid

19、ers of social networks and user-generated content services. The Task Force also contributed to the development of codes of practice for new forms of content on mobile phones and passive location services and worked on public awareness campaigns and guidance for young people, and their parents and ca

20、rers, for using the Internet and related technologies safely. In addition to the above, the Task Force recommended the creation of the Child Exploitation and Online Protection Centre (CEOP).Recognizing the role of parents and carers in developing a safe Internet environment, a subgroup of the Task F

21、orce was created in 2003 to specifically consider rating, filtering and monitoring products (access control systems) for use in the home.At this time numerous commercial products were emerging, but there were concerns over their quality and effectiveness. Additionally, there was no permanent, indepe

22、ndent source of evaluation for such products, meaning that parents/carers often faced difficulties in understanding the many issues, and in finding reliable products which met their requirements.In 2004, the subgroup coordinated a short-term project to produce a guide for parents on available option

23、s for managing their childrens use of the Internet. Longer-term aims included the development of a solution for keeping parents informed of the risks, and suitable products and services for managing them, which could also keep pace with technological changes. The subgroup decided to develop a third-

24、party conformity certification scheme against which access control systems could be tested, providing impartial advice to parents on product features, capabilities, ease of use and confidence in their quality.This Publicly Available Specification has been developed primarily for use by software deve

25、lopers working with access control systems. It sets out the minimum performance requirements for the access control systems to obtain a third-party conformity certification. An overview of the laboratory procedures is given in Annex A.It must be recognized however, that no access control system can

26、be effective 100% of the time and that, despite rigorous controls, there may still be occasions when inappropriate materials may be accessed. In such instances, providing education on the issues, and developing strategies for protecting themselves, is essential in helping children and young people b

27、ecome safe and discriminating users of Internet-based content and services. Licensed Copy: Wang Bin, ISO/EXCHANGE CHINA STANDARDS, 11/07/2008 03:21, Uncontrolled Copy, (c) BSIPAS 74:20082 BSI 2008This Publicly Available Specification is primarily aimed at the development of access control systems fo

28、r use in the consumer market in the UK. It covers both those products installed locally (i.e. by a parent/carer on a home computer) and remotely managed products/services (i.e. those products or services offered by Internet Service Providers). The development of this Publicly Available Specification

29、 has been jointly sponsored by the Home Office and Ofcom.1 ScopeThis Publicly Available Specification specifies requirements for products, services, tools and other systems that allow UK adult Internet users to easily control childrens access to inappropriate Internet-based content and services.It s

30、pecifies requirements on: a) ease of installation, configuration and use;b) effectiveness;c) minimum features;d) ease of updating;e) quality of instructions;f) consumer communications and support.By using a certified product or service, parents/carers will have confidence in the ability of the acces

31、s control system to:a) block inappropriate content (see Clause 4);b) block communications via Internet-based services that are inappropriate (see Clause 5);c) prevent unauthorized users from changing or disabling the access control settings (see Clause 6);d) provide an appropriate level of protectio

32、n (as specified by this PAS) upon implementation/installation either through the use of default settings or configuration in accordance with user documentation (see Clause 7);e) configure the product or service where such a capability is offered (see Clause 8);f) remain up to date (within the terms

33、of any licensing or subscription requirements) (see Clause 9).Furthermore, where the access control system can be installed, parents/carers will have confidence in their ability to uninstall/remove the product or service (see Clause 10).Licensed Copy: Wang Bin, ISO/EXCHANGE CHINA STANDARDS, 11/07/20

34、08 03:21, Uncontrolled Copy, (c) BSI BSI 2008 3PAS 74:2008By using a certified product or service, parents/carers will:a) have confidence in the ability to obtain suitable system support should they encounter problems with implementing, maintaining or installing/removing the access control system (s

35、ee Clause 11);b) have confidence in the level and quality of information they will receive in the product description and user documentation provided with the product or service and will have confidence in the quality of the instructions to enable them to effectively install and configure the access

36、 control system to an effective level of protection (see Clause 12);c) have access to user education materials providing information and links to information that enable parents/carers and children to stay informed of the issues and risks of using the Internet (see Clause 13).2 Terms and definitions

37、For the purposes of this Publicly Available Specification, the following terms and definitions apply.2.1 access control systemsoftware product or service, including user documentation, designed to provide safeguards against inappropriate content and contact when using the Internet and/or related tec

38、hnologies through a process of filtering and blocking NOTE Although this term is primarily used within this PAS to describe software used on a computer, access control systems can apply to any type of communications device providing access to Internet-based content and services, such as mobile phone

39、s, handheld devices and Internet-enabled games consoles.2.2 blockingprevention of access to content or services in its entirety (e.g. chat)2.3 certification bodythird-party body contracted to provide certification to a customer2.4 chatreal time communication between two or more users over the Intern

40、et in virtual meeting places or chat rooms (see also 2.13)2.5 communicationany process where data (such as messages, files or administration information) is conveyed between computer systems2.6 contentany material, such as text, images, sound, animation or video, which can be accessed or received us

41、ing the Internet2.7 emailsystem of sending messages (which may include text, images, sound, animation or video) over the Internet for immediate or later retrievalLicensed Copy: Wang Bin, ISO/EXCHANGE CHINA STANDARDS, 11/07/2008 03:21, Uncontrolled Copy, (c) BSIPAS 74:20084 BSI 20082.8 end userperson

42、 who is protected by the access control systemNOTE It is anticipated that in most instances the end user will be a child, young person or vulnerable adult, but if the access control system or system software allows for multiple user accounts to be created it could be any person using the computer/de

43、vice.2.9 filteringselective blocking of content (e.g. web pages) against specified criteria2.10 hate materialmaterial which promotes hatred and intolerance (see also 2.25 and B.3)2.11 inappropriate content material which, while not illegal, may not be considered suitable for a particular person NOTE

44、 The content covered by this definition are listed in Annex B.2.12 inexperienced userperson who has basic IT skills considered to include a basic knowledge of navigating an operating system, system desktop (user interface) and running productivity tools, but includes little to no experience of confi

45、guring system changes for both hardware and software NOTE It is assumed that the parent/carer is an inexperienced user (see 2.19).2.13 instant messagecollaborative messaging system which allows communication and sharing of files in real time over the Internet (see also chat), usually one-to-one2.14

46、Internetglobal interconnected network of networked computers, providing an infrastructure through which applications such as web browsing, email, chat and instant messaging operate2.15 Internet Service Providerprovider of Internet services such as Internet connectivity and web site hosting2.16 manuf

47、acturerorganization which develops the access control system2.17 newsgrouparea categorized by its subject on Usenet, where users can post or read comments about that subject2.18 overblockingprevention of access to acceptable content as a result of the controls imposed by an access control system2.19

48、 parent/carerperson who authorizes the implementation and configuration of the access control systemNOTE 1 It is anticipated that in most instances the local administrator will be a parent (or other responsible adult) who wishes to provide access controls on a computer or other Internet-enabled devi

49、ce within the home setting. NOTE 2 It is assumed that the parent/carer is an inexperienced user (see 2.12).Licensed Copy: Wang Bin, ISO/EXCHANGE CHINA STANDARDS, 11/07/2008 03:21, Uncontrolled Copy, (c) BSI BSI 2008 5PAS 74:20082.20 post, postingprocess of contributing to a forum or newsgroup or publishing comments or other material, typically on a website which is viewable by others2.21 product descriptionreadily accessible information stating the properties of the access control systemNOTE The product description c

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1