ImageVerifierCode 换一换
格式:PDF , 页数:26 ,大小:2MB ,
资源ID:396751      下载积分:5000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-396751.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(BS ISO IEC 29190-2015 Information technology Security techniques Privacy capability assessment model《信息技术 安全技术 隐私能力评估模型》.pdf)为本站会员(registerpick115)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

BS ISO IEC 29190-2015 Information technology Security techniques Privacy capability assessment model《信息技术 安全技术 隐私能力评估模型》.pdf

1、BSI Standards Publication BS ISO/IEC 29190:2015 Information technology Security techniques Privacy capability assessment modelBS ISO/IEC 29190:2015 BRITISH STANDARD National foreword This British Standard is the UK implementation of ISO/IEC 29190:2015. The UK participation in its preparation was ent

2、rusted to Technical Committee IST/33, IT - Security techniques. A list of organizations represented on this committee can be obtained on request to its secretary. This publication does not purport to include all the necessary provisions of a contract. Users are responsible for its correct applicatio

3、n. The British Standards Institution 2015. Published by BSI Standards Limited 2015 ISBN 978 0 580 70448 2 ICS 35.040 Compliance with a British Standard cannot confer immunity from legal obligations. This British Standard was published under the authority of the Standards Policy and Strategy Committe

4、e on 31 August 2015. Amendments issued since publication Date Text affectedBS ISO/IEC 29190:2015 Information technology Security techniques Privacy capability assessment model Technologies de linformation Techniques de scurit Modle dvaluation de laptitude la confidentialit INTERNATIONAL STANDARD ISO

5、/IEC 29190 Reference number ISO/IEC 29190:2015(E) First edition 2015-08-15 ISO/IEC 2015 BS ISO/IEC 29190:2015ii ISO/IEC 2015 All rights reserved COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2015, Published in Switzerland All rights reserved. Unless otherwise specified, no part of this publication may be rep

6、roduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below or ISOs member body in the country of the request

7、er. ISO copyright office Ch. de Blandonnet 8 CP 401 CH-1214 Vernier, Geneva, Switzerland Tel. +41 22 749 01 11 Fax +41 22 749 09 47 copyrightiso.org www.iso.org ISO/IEC 29190:2015(E)BS ISO/IEC 29190:2015ISO/IEC 29190:2015(E)Foreword iv Introduction v 1 Scope . 1 2 Normative references 1 3 T erms and

8、 definitions . 1 4 Methodology . 1 4.1 Introduction 1 4.2 Define a privacy capability assessment model 2 4.3 Capability scale . 4 4.4 Rate the processs current capability vs. target capability 5 4.5 Determine sub-optimal processes . 6 4.6 Identify proposals for changing processes . 6 4.7 Modify proc

9、esses . 7 5 Capability assessment process 7 5.1 Introduction 7 5.2 Plan the assessment . 7 5.3 Identify privacy activities and target capabilities . 8 5.4 Identify privacy-related processes. 9 5.5 Prepare criteria for information collection 9 5.6 Collect and analyse information .10 5.7 Present resul

10、ts 11 6 Example of a business function approach .11 Bibliography .15 ISO/IEC 2015 All rights reserved iii Contents PageBS ISO/IEC 29190:2015ISO/IEC 29190:2015(E) Foreword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the special

11、ized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical comm

12、ittees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1. The procedu

13、res used to develop this document and those intended for its further maintenance are described in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for the different types of document should be noted. This document was drafted in accordance with the editorial rules

14、 of the ISO/IEC Directives, Part 2 (see www.iso.org/directives). Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. Details of any patent rights

15、 identified during the development of the document will be in the Introduction and/or on the ISO list of patent declarations received (see www.iso.org/patents). Any trade name used in this document is information given for the convenience of users and does not constitute an endorsement. For an expla

16、nation on the meaning of ISO specific terms and expressions related to conformity assessment, as well as information about ISOs adherence to the WTO principles in the Technical Barriers to Trade (TBT), see the following URL: Foreword Supplementary information. The committee responsible for this docu

17、ment is ISO/IEC JTC 1, Information technology, SC 27, Security techniques.iv ISO/IEC 2015 All rights reservedBS ISO/IEC 29190:2015ISO/IEC 29190:2015(E) Introduction The aim of this International Standard is to provide organizations with high-level guidance about how to assess the level of their abil

18、ity (capability) to manage privacy-related processes. This International Standard focuses on an approach for assessing the efficiency and effectiveness of privacy-related processes used by organizations. Guidance on the issue of privacy management needs is multi-faceted as follows: The decision supp

19、ort information useful to a senior executive in formulating and executing a privacy strategy is different from the decision support useful to operational and line-of-business staff even though their various activities might all ultimately be directed towards the same goal; There are likely to be mul

20、tiple “privacy stakeholders” (that is, parties who have an interest in the way the organization manages privacy). Those stakeholders might impose very different requirements, for example, driven by legal and regulatory compliance requirements, but also by inter-related “good practice” provisions sti

21、pulated, for example, by policies, codes-of-conduct, business risk assessments, audit findings, reputational, and/or financial imperatives and/or personal privacy preferences. A broader, good practice context is important because it is possible for an organization to meet its legal and regulatory co

22、mpliance obligations and still suffer significant damage if it fails to address the requirements of the other stakeholders. An assessment of the organizations capabilities in this area will need to meet the following principal sets of criteria: It needs to provide the organization with information w

23、hich is useful to the appropriate level or levels of management; It needs to cater for the fact that “capability” needs to be assessed in many different domains (legal compliance, risk management, reputation, and so on). This International Standard is aimed at those individuals responsible for direc

24、ting, managing, and operating an organizations privacy management capabilities, or those responsible for advising the relevant stakeholder group. Thus, the capability model will consider multiple kinds of privacy stakeholder requirements and will result in guidance to multiple levels of stakeholders

25、, from enterprise strategists to operational and line-of-business managers. This International Standard provides guidance for how to set up a capability assessment program within an organization. It is expected that the management of the organization will need to apply an iterative and incremental p

26、rocess of improvement using the criteria defined for assessing their privacy capability. Once a baseline assessment has been identified and a set of targets for improvement of the organizations capability has been agreed, then the assessment will need to be periodically repeated in order to move the

27、 organization, over increments, towards the targeted level of capability desired by the organization. This International Standard guides organizations towards the production of several different kinds of output: an overall “score” against a simple capability assessment model; a set of metrics indica

28、ting assessment against key performance indicators; the detailed outputs from privacy process management audits and management practices (for example, assessment against data protection criteria and data custody best practice) for input into improving capability in these specific areas. ISO/IEC 2015

29、 All rights reserved vBS ISO/IEC 29190:2015BS ISO/IEC 29190:2015Information technology Security techniques Privacy capability assessment model 1 Scope This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.

30、 In particular, it specifies steps in assessing processes to determine privacy capability, specifies a set of levels for privacy capability assessment, provides guidance on the key process areas against which privacy capability can be assessed, provides guidance for those implementing process assess

31、ment, and provides guidance on how to integrate the privacy capability assessment into organizations operations. 2 Normative references The following documents, in whole or in part, are normatively referenced in this document and are indispensable for its application. For dated references, only the

32、edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. ISO/IEC 29100, Information technology Security techniques Privacy framework ISO/IEC 33001:2015, Information technology Process assessment Concepts and terminology ISO/IEC

33、33020:2015, Information technology Process assessment Process measurement framework for assessment of process capability 3 T erms a nd definiti ons For the purposes of this document, the terms and definitions given in ISO/IEC 29100 and ISO/IEC 33001 and apply. 4 Methodology 4.1 Introduction In the c

34、urrent global environment, there is a tendency towards collection, use, disclosure and retention of more and more personally identifiable information (PII), for purposes ranging from support for business operations to national security and law enforcement. As is evident from the regular notification

35、 of privacy breaches, much more work is required on the part of organizations to adequately protect the PII that they are collecting, using, disclosing and retaining, as required by relevant national regulatory laws. INTERNATIONAL ST ANDARD ISO/IEC 29190:2015(E) ISO/IEC 2015 All rights reserved 1BS

36、ISO/IEC 29190:2015ISO/IEC 29190:2015(E) One way to develop and refine an organizations processes is to begin with an assessment of their existing capabilities in this area. To perform a process assessment in the privacy domain, typically involves the following activities: Define a privacy capability

37、 assessment model (see 4.2); Define a capability scale (see 4.3); Rate the processs current capability vs. target capability (see 4.4); Determine sub optimal processes (see 4.5); Identify proposals for changing processes (see 4.6); Modify processes (see 4.7); Identify the privacy activities and targ

38、et capability (see 5.1); Identify the privacy-related processes (see 5.4); Prepare criteria for information collection (see 5.5); Collect and analyse information from privacy-related processes (5.6). An optional additional subsequent action is to map the capability determination (i.e. the target cap

39、ability level) to a scale taken from a process assessment model to assist in goal setting, comparative analysis (i.e. to measure current capability and use as a baseline for assessing an incremental process improvement target), and continual improvement strategies (i.e. develop a context or business

40、 function improvement strategy to use in planning for a process improvement project). This International Standard as a whole guides organizations towards the production of several different kinds of output: an over-all “score” against a simple capability assessment such as the example of the six-lev

41、el model described in 4.3; a set of metrics indicating assessment against key performance indicators in areas such as those described in the second example in 5.1; the detailed outputs from audit and management disciplines in specific areas of privacy management (for example, assessment against data

42、 protection criteria and data custody best practice). 4.2 Define a pri v acy capability assessment mo del ISO/IEC 3300x is a suite of International Standards that has been developed by the ISO/IEC JTC 1/SC 7 Software and system engineering committee. It provides information on the concepts of proces

43、s assessment and its use in process improvement and process capability determination. ISO/IEC 29190 uses the concepts of ISO/IEC 3300x for the assessment of privacy capability. For the purposes of this International Standard, a process assessment model is related to one or more process reference mod

44、els. It forms the basis for the collection of evidence and rating of a process quality characteristic. The relationships within the process assessment model is shown in Figure 1. The information collected during assessments should be referenced against this model in order to determine a relative cap

45、ability.2 ISO/IEC 2015 All rights reservedBS ISO/IEC 29190:2015ISO/IEC 29190:2015(E) Figure 1 Process assessment model relationships Privacy capability assessment assumes a cycle of continuous improvement, as shown in Figure 2. Figure 2 Lifecycle of privacy capability assessment With some refinement

46、, a capability assessment model can be used to assess how competent an organization is with respect to, for instance, protecting PII as required by relevant national regulatory ISO/IEC 2015 All rights reserved 3BS ISO/IEC 29190:2015ISO/IEC 29190:2015(E) laws. A capability assessment model can also b

47、e used as a benchmark for comparing different organizations where there is something that can be used as a basis for comparison. For the purposes of this International Standard, the basis for comparison should be the organizations processes for handling PII in a manner compliant with national regula

48、tory laws and relevant good practice. A capability assessment model typically involves the following aspects: a) Capability Levels: a layered framework providing a progression to the discipline needed to engage in continuous improvement. It is important to note that an organization needs to develop

49、the ability to assess the impact of a new practice, technology or tool on their business activities. Hence it is not a matter of adopting these rather it is a matter of determining how innovative efforts influence existing practices. This empowers projects, teams, and organizations by giving them the foundation to support reasoned choice. b) Key Process Areas: this identifies a cluster of related activities which, when

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1