{"id":415803,"date":"2024-10-20T06:07:16","date_gmt":"2024-10-20T06:07:16","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-275592022\/"},"modified":"2024-10-26T11:22:27","modified_gmt":"2024-10-26T11:22:27","slug":"bs-iso-iec-275592022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-275592022\/","title":{"rendered":"BS ISO\/IEC 27559:2022"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nNational foreword <\/td>\n<\/tr>\n
7<\/td>\nForeword <\/td>\n<\/tr>\n
8<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 \u200bScope
2 \u200bNormative references
3 \u200bTerms and definitions <\/td>\n<\/tr>\n
11<\/td>\n4 \u200bSymbols and abbreviated terms
5 \u200bOverview <\/td>\n<\/tr>\n
12<\/td>\n6 \u200bContext assessment
6.1 \u200bGeneral
6.2 \u200bThreat modelling
6.2.1 \u200bGeneral <\/td>\n<\/tr>\n
13<\/td>\n6.2.2 \u200bSecurity and privacy practices
6.2.3 \u200bMotives and capacity to re-identify <\/td>\n<\/tr>\n
14<\/td>\n6.3 \u200bTransparency and impact assessment
6.3.1 \u200bGeneral
6.3.2 \u200bTransparency of actions and stakeholder engagement
6.3.3 \u200bPrivacy-related harms <\/td>\n<\/tr>\n
15<\/td>\n7 \u200bData assessment
7.1 \u200bGeneral
7.2 \u200bData features
7.2.1 \u200bGeneral
7.2.2 \u200bData principals
7.2.3 \u200bData type <\/td>\n<\/tr>\n
16<\/td>\n7.2.4 \u200bAttribute types
7.2.5 \u200bDataset properties
7.3 \u200bAttack modelling
7.3.1 \u200bGeneral <\/td>\n<\/tr>\n
17<\/td>\n7.3.2 \u200bMaximum or average risk
7.3.3 \u200bPopulation or sample-based attack
7.3.4 \u200bData privacy models <\/td>\n<\/tr>\n
18<\/td>\n8 \u200bIdentifiability assessment and mitigation
8.1 \u200bGeneral
8.2 \u200bAssessing identifiability
8.2.1 \u200bGeneral
8.2.2 \u200bQuantifying identifiability <\/td>\n<\/tr>\n
19<\/td>\n8.2.3 \u200bAdversarial testing <\/td>\n<\/tr>\n
20<\/td>\n8.3 \u200bMitigation
8.3.1 \u200bGeneral
8.3.2 \u200bReconfiguring the environment
8.3.3 \u200bTransforming the data <\/td>\n<\/tr>\n
21<\/td>\n8.3.4 \u200bRe-evaluation
9 \u200bDe-identification governance
9.1 \u200bGeneral
9.2 \u200bBefore data are made available
9.2.1 \u200bGeneral
9.2.2 \u200bAssigning roles and responsibilities <\/td>\n<\/tr>\n
22<\/td>\n9.2.3 \u200bEstablishing principles, policies and procedures
9.2.4 \u200bIdentifying and managing a data disclosure <\/td>\n<\/tr>\n
23<\/td>\n9.2.5 \u200bCommunicating with stakeholders
9.3 \u200bAfter data are made available
9.3.1 \u200bGeneral
9.3.2 \u200bMonitoring the data environment
9.4 \u200bMitigation in case of incident <\/td>\n<\/tr>\n
25<\/td>\nAnnex A (informative) Example identifiers <\/td>\n<\/tr>\n
27<\/td>\nAnnex B (informative) Example threshold identifiability benchmarks <\/td>\n<\/tr>\n
29<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information security, cybersecurity and privacy protection. Privacy enhancing data de-identification framework<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2022<\/td>\n32<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":415809,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-415803","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/415803","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/415809"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=415803"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=415803"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=415803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}