{"id":415798,"date":"2024-10-20T06:07:14","date_gmt":"2024-10-20T06:07:14","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-275572022\/"},"modified":"2024-10-26T11:22:24","modified_gmt":"2024-10-26T11:22:24","slug":"bs-iso-iec-275572022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-275572022\/","title":{"rendered":"BS ISO\/IEC 27557:2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 \u200bScope 2 \u200bNormative references 3 \u200bTerms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 \u200bPrinciples of organizational privacy risk management 5 \u200bFramework 5.1 \u200bGeneral 5.2 \u200bLeadership and commitment <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5.3 \u200bIntegration 5.4 \u200bDesign 5.4.1 \u200bUnderstanding the organization and its context 5.4.2 \u200bArticulating risk management commitment 5.4.3 \u200bAssigning organizational roles, authorities, responsibilities and accountabilities 5.4.4 \u200bAllocating resources <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5.4.5 \u200bEstablishing communication and consultation 5.5 \u200bImplementation 5.6 \u200bEvaluation 5.7 \u200bImprovement 5.7.1 \u200bAdapting 5.7.2 \u200bContinually improving 6 \u200bRisk management process 6.1 \u200bGeneral 6.2 \u200bCommunication and consultation <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 6.3 \u200bScope, context and criteria 6.3.1 \u200bGeneral 6.3.2 \u200bDefining the scope 6.3.3 \u200bExternal and internal context 6.3.4 \u200bDefining risk criteria <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6.4 \u200bRisk assessment 6.4.1 \u200bGeneral 6.4.2 \u200bRisk identification <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.4.3 \u200bRisk analysis <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.4.4 \u200bRisk evaluation 6.5 \u200bRisk treatment 6.5.1 \u200bGeneral 6.5.2 \u200bSelection of risk treatment options <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6.5.3 \u200bPreparing and implementing risk treatment plans 6.6 \u200bMonitoring and review <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 6.7 \u200bRecording and reporting <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Annex A (informative) PII processing identification <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Annex B (informative) Example privacy events and causes <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Annex C (informative) Privacy impact and consequence examples <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Annex D (informative) Template showing the severity scale for privacy impacts on individuals <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information security, cybersecurity and privacy protection. Application of ISO 31000:2018 for organizational privacy risk management<\/b><\/p>\n |