{"id":463271,"date":"2024-10-20T10:27:40","date_gmt":"2024-10-20T10:27:40","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-2089-1-2024-2\/"},"modified":"2024-10-26T19:21:18","modified_gmt":"2024-10-26T19:21:18","slug":"ieee-2089-1-2024-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-2089-1-2024-2\/","title":{"rendered":"IEEE 2089.1-2024"},"content":{"rendered":"
New IEEE Standard – Active. Framework for the design, specification, evaluation, and deployment of online age verification systems are established in this standard. This standard is the second in a family of standards focused on the 5Rights principles.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | IEEE Std 2089.1\u2122-2024 Front cover <\/td>\n<\/tr>\n | ||||||
2<\/td>\n | Title page <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Important Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 1.\u2002Overview 1.1\u2002Scope 1.2\u2002Purpose <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 1.3\u2002Word usage 1.4\u2002Use of the standard <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 1.5\u2002Process overview <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 2.\u2002Normative references <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 3.\u2002Definitions, acronyms, and abbreviations 3.1\u2002Definitions <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 4.\u2002Acronyms and abbreviations 5.\u2002Conformance <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.\u2002Key concepts and application 6.1\u2002General application <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 6.2\u2002Specified context of use 6.3\u2002The organization <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 6.4\u2002Stakeholders <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 6.5\u2002Stages and processes 7.\u2002Roles and responsibilities of key actors in the age assurance process 7.1\u2002General 7.2\u2002Role descriptions <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 7.3\u2002User 8.\u2002Determining the need for age assurance (\u201cdetermination phase\u201d) 8.1\u2002Purpose 8.2\u2002Outcomes <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 8.3\u2002Activities and tasks <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 8.4\u2002Inputs 8.5\u2002Outputs 9.\u2002Selecting the method(s) of age assurance (\u201cselection phase\u201d) 9.1\u2002Purpose 9.2\u2002Outcomes <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 9.3\u2002Activities and tasks <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 9.4\u2002Inputs <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 9.5\u2002Outputs 10.\u2002Assuring the age of a user (\u201cassurance phase\u201d) 10.1\u2002Purpose 10.2\u2002Outcomes 10.3\u2002Activities and tasks <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 10.4\u2002Inputs <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 10.5\u2002Outputs 11.\u2002Categorizing the level of confidence with which the assurance has been completed (\u201ccategorization phase\u201d) 11.1\u2002Purpose 11.2\u2002Outcomes 11.3\u2002Activities and tasks <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 11.4\u2002Inputs 11.5\u2002Outputs 12.\u2002Exchanging the results of age assurance checks with other organizations (\u201cinteroperability phase\u201d) 12.1\u2002Purpose 12.2\u2002Outcomes 12.3\u2002Activities and tasks <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 12.4\u2002Inputs 12.5\u2002Outputs 13.\u2002Protecting the privacy of users when undertaking age assurance (\u201cprivacy phase\u201d) 13.1\u2002Purpose <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 13.2\u2002Outcomes 13.3\u2002Activities and tasks 13.4\u2002Inputs 13.5\u2002Outputs <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 14.\u2002Securing data relating to users used when undertaking age assurance (\u201cdata security phase\u201d) 14.1\u2002Purpose 14.2\u2002Outcomes 14.3\u2002Activities and tasks 14.4\u2002Inputs 14.5\u2002Outputs <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | Annex\u00a0A (normative) Five standard levels of age assurance derived from six indicators of confidence in age assurance output A.1\u2002Indicators of confidence <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | A.2\u2002Asserted age <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | A.3\u2002Indicator of confidence: Accuracy of the outcome levels <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | A.4\u2002Indicator of confidence: Frequency of age assurance <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | A.5\u2002Indicator of confidence: Counter fraud measures A.6\u2002Indicator of confidence: Authentication requirements A.7\u2002Indicators of confidence: Frequency of authentication <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | A.8\u2002Indicator of confidence: Birth date requirements <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | Annex\u00a0B (normative) Assessing the risk to children: The 4 Cs of online risk <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | B.1\u2002Risk profiles B.2\u2002Risk register of common features <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | Annex\u00a0C (informative) Bibliography <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | Back cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Standard for Online Age Verification (Published)<\/b><\/p>\n |