BS ISO 31700-1:2023
$189.07
Consumer protection. Privacy by design for consumer goods and services – High-level requirements
Published By | Publication Date | Number of Pages |
BSI | 2023 | 48 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
8 | Foreword |
9 | Introduction |
11 | 1 Scope 2 Normative references 3 Terms and definitions |
18 | 4 General 4.1 Overview |
19 | 4.2 Designing capabilities to enable consumers to enforce their privacy rights 4.2.1 Requirement 4.2.2 Explanation |
20 | 4.2.3 Guidance 4.3 Developing capability to determine consumer privacy preferences 4.3.1 Requirement |
21 | 4.3.2 Explanation 4.3.3 Guidance 4.4 Designing human computer interface (HCI) for privacy 4.4.1 Requirement |
22 | 4.4.2 Explanation 4.4.3 Guidance 4.5 Assigning relevant roles and authorities 4.5.1 Requirement 4.5.2 Explanation 4.5.3 Guidance |
23 | 4.6 Establishing multi-functional responsibilities 4.6.1 Requirement 4.6.2 Explanation 4.6.3 Guidance 4.7 Developing privacy knowledge, skill and ability 4.7.1 Requirement |
24 | 4.7.2 Explanation 4.7.3 Guidance 4.8 Ensuring knowledge of privacy controls 4.8.1 Requirement 4.8.2 Explanation |
25 | 4.8.3 Guidance 4.9 Documentation and information management 4.9.1 Requirement 4.9.2 Explanation |
26 | 4.9.3 Guidance 5 Consumer communication requirements 5.1 Overview |
27 | 5.2 Provision of privacy information 5.2.1 Requirement 5.2.2 Explanation 5.2.3 Guidance |
28 | 5.3 Accountability for providing privacy information 5.3.1 Requirement |
29 | 5.3.2 Explanation 5.3.3 Guidance 5.4 Responding to consumer inquiries and complaints 5.4.1 Requirement 5.4.2 Explanation 5.4.3 Guidance 5.5 Communicating to diverse consumer population 5.5.1 Requirement 5.5.2 Explanation |
30 | 5.5.3 Guidance 5.6 Prepare data breach communications 5.6.1 Requirement 5.6.2 Explanation 5.6.3 Guidance |
31 | 6 Risk management requirements 6.1 Overview 6.2 Conducting a privacy risk assessment 6.2.1 Requirement 6.2.2 Explanation |
32 | 6.2.3 Guidance 6.3 Assessing privacy capabilities of third parties 6.3.1 Requirement |
33 | 6.3.2 Explanation 6.3.3 Guidance 6.4 Establishing and documenting requirements for privacy controls 6.4.1 Requirement: 6.4.2 Explanation |
34 | 6.4.3 Guidance 6.5 Monitoring and updating risk assessment 6.5.1 Requirement 6.5.2 Explanation 6.5.3 Guidance |
35 | 6.6 Including privacy risks in cybersecurity resilience design 6.6.1 Requirement 6.6.2 Explanation 6.6.3 Guidance 7 Developing, deploying and operating designed privacy controls 7.1 Overview |
36 | 7.2 Integrating the design and operation of privacy controls into the product development and management lifecycles 7.2.1 Requirement 7.2.2 Explanation 7.2.3 Guidance |
37 | 7.3 Designing privacy controls 7.3.1 Requirement 7.3.2 Explanation 7.3.3 Guidance 7.4 Implementing privacy controls 7.4.1 Requirement 7.4.2 Explanation 7.4.3 Guidance |
38 | 7.5 Designing privacy control testing 7.5.1 Requirement 7.5.2 Explanation 7.5.3 Guidance |
39 | 7.6 Managing the transition of privacy controls 7.6.1 Requirement 7.6.2 Explanation 7.6.3 Guidance |
40 | 7.7 Managing the operation of privacy controls 7.7.1 Requirement 7.7.2 Explanation 7.7.3 Guidance 7.8 Preparing for and managing a privacy breach 7.8.1 Requirement |
41 | 7.8.2 Explanation 7.8.3 Guidance 7.9 Operating privacy controls for the processes and products upon which the product in scope depends throughout the PII lifecycle 7.9.1 Requirement 7.9.2 Explanation 7.9.3 Guidance |
42 | 8 End of PII lifecycle requirements 8.1 Overview 8.2 Designing privacy controls for retirement and end of use 8.2.1 Requirement 8.2.2 Explanation 8.2.3 Guidance |
44 | Bibliography |