IEEE - PDP - Personal Data Privacy Working Group
The purpose of this standard is to have one overall methodological approach that specifies practices to manage privacy issues within the systems/software engineering life cycle processes.
The purpose of this standard is to have one overall methodological approach that specifies practices to manage privacy issues within the systems/software engineering life cycle processes.
This standard is designed to provide individuals or organizations creating algorithms, largely in regards to autonomous or intelligent systems, certification-oriented methodologies to provide clearly articulated accountability and clarity around how algorithms are targeting, assessing and influencing the users and stakeholders of said algorithm. Certification under this standard will allow algorithm creators to communicate to users, and regulatory authorities, that up-to-date best practices were used in the design, testing and evaluation of the algorithm to avoid unjustified differential impact on users.
This standard is designed to provide organizations handling child and student data governance-oriented processes and certifications guaranteeing the transparency and accountability of their actions as it relates to the safety and wellbeing of children, their parents, the educational institutions where they are enrolled, and the community and societies where they spend their time, both on and offline. It is also designed to help parents and educators, with an understanding that most individuals may not be tech-savvy enough to understand underlying issues of data usage, but still must be properly informed about the safety of their children's data and provided with tools and services that provide proper opportunities for content based, pre-informed choice regarding their family's data.
In this standards is defined a cryptographic protocol to provide integrity, and optional confidentiality, for cyber security of serial link.
This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security, and information security) for manufacturers, users, and others on the selection, installation, configuration, and usage of hardcopy devices (HCDs) and systems, including printers, copiers, and multifunction devices (MFDs), and the computer systems that support these devices.
The standard provides technical requirements for power system cybersecurity.
This standard specifies cryptographic and data authentication procedures for storage devices that support length-expansion, such as tape drives. Such procedures include the following cryptographic modes of operation for the AES block cipher: CCM, GCM, CBC-HMAC, and XTS-HMAC.
The standard provides phenotypic and demographic definitions that technologists and auditors can use to assess the diversity of face data used for training and benchmarking algorithmic performance, establishes accuracy reporting and data diversity protocols/rubrics for automated facial analysis, and outlines a rating system to determine contexts in which automated facial analysis technology should not be used.
IEEE SA offers a wide range of training and development opportunities to help individuals and organizations stay informed on what matters most in technology.
A strong priority for this work is to contribute to standards to enable consideration of the support for data management in the cloud. Data spaces can only be fully realised with the application of strong quality management controls through standardisation at multiple levels.
In the framework of this fellowship, I contribute to several different standardisation activities, including: addressing minor edits to IEEE 2089.1 and developing a Certification Scheme with IEEE, applying to IEEE CTSoc/ETSC to form a study group to develop a PAR on Parental Consent, participation in BSI IST/33/5 and ISO/IEC JTC1 SC27 WG5 re ISO 27566 Parts 1, 2 and 3, ETSI STF 681 Age Verification Expert Member.