BSI PAS 94:2013
$50.69
Implementing privacy impact assessment (PIA) frameworks in radio frequency identification (RFID) applications. Guide
Published By | Publication Date | Number of Pages |
BSI | 2013 | 32 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
3 | Contents |
4 | Foreword |
5 | 0 Introduction |
7 | 1 Scope |
8 | 2 Terms and definitions |
9 | 3 The PIA process 3.1 General 3.2 Outline |
10 | 3.3 Description of the application 3.4 Initial analysis phase |
11 | 3.5 Full-scale PIA process 3.6 Small-scale PIA process 3.7 Risk assessment phase 3.8 Identification of risks 3.9 Deactivation of tags |
12 | 3.10 Identification and recommendation of controls 3.11 Documentation of resolution and residual risks 3.12 PIA report |
13 | 4 The common European RFID notification signage system 4.1 General 4.2 Definition of the common European notification signage system 4.3 The common RFID emblem |
14 | 4.4 Purpose of the application 4.5 Contact point 4.6 Name of the operator of the application |
15 | 4.7 Contact method 4.8 Placement of common European RFID notification signs 4.9 Presence of readers |
16 | 4.10 Presence of tags |
17 | 4.11 Signage on tagged items 4.12 Signage on embedded tags 4.13 Guidelines on additional information |
18 | Annex A (informative) Overview of automatic identification and privacy |
21 | Annex B (informative) Description of the RFID application |
26 | Annex C (informative) Protecting the privacy of the individual: the EC approach to RFID |
27 | Annex D (informative) Case studies for the use of RFID notification signage |
29 | Bibliography |