{"id":424337,"date":"2024-10-20T06:51:15","date_gmt":"2024-10-20T06:51:15","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-31700-12023\/"},"modified":"2024-10-26T12:52:48","modified_gmt":"2024-10-26T12:52:48","slug":"bs-iso-31700-12023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-31700-12023\/","title":{"rendered":"BS ISO 31700-1:2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 4 General 4.1 Overview <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 4.2 Designing capabilities to enable consumers to enforce their privacy rights 4.2.1 Requirement 4.2.2 Explanation <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 4.2.3 Guidance 4.3 Developing capability to determine consumer privacy preferences 4.3.1 Requirement <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 4.3.2 Explanation 4.3.3 Guidance 4.4 Designing human computer interface (HCI) for privacy 4.4.1 Requirement <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 4.4.2 Explanation 4.4.3 Guidance 4.5 Assigning relevant roles and authorities 4.5.1 Requirement 4.5.2 Explanation 4.5.3 Guidance <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 4.6 Establishing multi-functional responsibilities 4.6.1 Requirement 4.6.2 Explanation 4.6.3 Guidance 4.7 Developing privacy knowledge, skill and ability 4.7.1 Requirement <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 4.7.2 Explanation 4.7.3 Guidance 4.8 Ensuring knowledge of privacy controls 4.8.1 Requirement 4.8.2 Explanation <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 4.8.3 Guidance 4.9 Documentation and information management 4.9.1 Requirement 4.9.2 Explanation <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 4.9.3 Guidance 5 Consumer communication requirements 5.1 Overview <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 5.2 Provision of privacy information 5.2.1 Requirement 5.2.2 Explanation 5.2.3 Guidance <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 5.3 Accountability for providing privacy information 5.3.1 Requirement <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 5.3.2 Explanation 5.3.3 Guidance 5.4 Responding to consumer inquiries and complaints 5.4.1 Requirement 5.4.2 Explanation 5.4.3 Guidance 5.5 Communicating to diverse consumer population 5.5.1 Requirement 5.5.2 Explanation <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 5.5.3 Guidance 5.6 Prepare data breach communications 5.6.1 Requirement 5.6.2 Explanation 5.6.3 Guidance <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 6 Risk management requirements 6.1 Overview 6.2 Conducting a privacy risk assessment 6.2.1 Requirement 6.2.2 Explanation <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 6.2.3 Guidance 6.3 Assessing privacy capabilities of third parties 6.3.1 Requirement <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 6.3.2 Explanation 6.3.3 Guidance 6.4 Establishing and documenting requirements for privacy controls 6.4.1 Requirement: 6.4.2 Explanation <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 6.4.3 Guidance 6.5 Monitoring and updating risk assessment 6.5.1 Requirement 6.5.2 Explanation 6.5.3 Guidance <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 6.6 Including privacy risks in cybersecurity resilience design 6.6.1 Requirement 6.6.2 Explanation 6.6.3 Guidance 7 Developing, deploying and operating designed privacy controls 7.1 Overview <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 7.2 Integrating the design and operation of privacy controls into the product development and management lifecycles 7.2.1 Requirement 7.2.2 Explanation 7.2.3 Guidance <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 7.3 Designing privacy controls 7.3.1 Requirement 7.3.2 Explanation 7.3.3 Guidance 7.4 Implementing privacy controls 7.4.1 Requirement 7.4.2 Explanation 7.4.3 Guidance <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 7.5 Designing privacy control testing 7.5.1 Requirement 7.5.2 Explanation 7.5.3 Guidance <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 7.6 Managing the transition of privacy controls 7.6.1 Requirement 7.6.2 Explanation 7.6.3 Guidance <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 7.7 Managing the operation of privacy controls 7.7.1 Requirement 7.7.2 Explanation 7.7.3 Guidance 7.8 Preparing for and managing a privacy breach 7.8.1 Requirement <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 7.8.2 Explanation 7.8.3 Guidance 7.9 Operating privacy controls for the processes and products upon which the product in scope depends throughout the PII lifecycle 7.9.1 Requirement 7.9.2 Explanation 7.9.3 Guidance <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 8 End of PII lifecycle requirements 8.1 Overview 8.2 Designing privacy controls for retirement and end of use 8.2.1 Requirement 8.2.2 Explanation 8.2.3 Guidance <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Consumer protection. Privacy by design for consumer goods and services – High-level requirements<\/b><\/p>\n |