{"id":415803,"date":"2024-10-20T06:07:16","date_gmt":"2024-10-20T06:07:16","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-275592022\/"},"modified":"2024-10-26T11:22:27","modified_gmt":"2024-10-26T11:22:27","slug":"bs-iso-iec-275592022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-275592022\/","title":{"rendered":"BS ISO\/IEC 27559:2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 \u200bScope 2 \u200bNormative references 3 \u200bTerms and definitions <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4 \u200bSymbols and abbreviated terms 5 \u200bOverview <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 6 \u200bContext assessment 6.1 \u200bGeneral 6.2 \u200bThreat modelling 6.2.1 \u200bGeneral <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 6.2.2 \u200bSecurity and privacy practices 6.2.3 \u200bMotives and capacity to re-identify <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6.3 \u200bTransparency and impact assessment 6.3.1 \u200bGeneral 6.3.2 \u200bTransparency of actions and stakeholder engagement 6.3.3 \u200bPrivacy-related harms <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 7 \u200bData assessment 7.1 \u200bGeneral 7.2 \u200bData features 7.2.1 \u200bGeneral 7.2.2 \u200bData principals 7.2.3 \u200bData type <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 7.2.4 \u200bAttribute types 7.2.5 \u200bDataset properties 7.3 \u200bAttack modelling 7.3.1 \u200bGeneral <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 7.3.2 \u200bMaximum or average risk 7.3.3 \u200bPopulation or sample-based attack 7.3.4 \u200bData privacy models <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 8 \u200bIdentifiability assessment and mitigation 8.1 \u200bGeneral 8.2 \u200bAssessing identifiability 8.2.1 \u200bGeneral 8.2.2 \u200bQuantifying identifiability <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 8.2.3 \u200bAdversarial testing <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 8.3 \u200bMitigation 8.3.1 \u200bGeneral 8.3.2 \u200bReconfiguring the environment 8.3.3 \u200bTransforming the data <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 8.3.4 \u200bRe-evaluation 9 \u200bDe-identification governance 9.1 \u200bGeneral 9.2 \u200bBefore data are made available 9.2.1 \u200bGeneral 9.2.2 \u200bAssigning roles and responsibilities <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 9.2.3 \u200bEstablishing principles, policies and procedures 9.2.4 \u200bIdentifying and managing a data disclosure <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 9.2.5 \u200bCommunicating with stakeholders 9.3 \u200bAfter data are made available 9.3.1 \u200bGeneral 9.3.2 \u200bMonitoring the data environment 9.4 \u200bMitigation in case of incident <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Annex A (informative) Example identifiers <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Annex B (informative) Example threshold identifiability benchmarks <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information security, cybersecurity and privacy protection. Privacy enhancing data de-identification framework<\/b><\/p>\n |