Framework of de-identification process for telecommunication service providers Read more about Framework of de-identification process for telecommunication service providers
Information technology - Security techniques - Code of practice for personally identifiable information protection Read more about Information technology - Security techniques - Code of practice for personally identifiable information protection
Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines Read more about Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines
Information technology — Security techniques — Guidelines for privacy impact assessment Read more about Information technology — Security techniques — Guidelines for privacy impact assessment
Information technology — Security techniques — Requirements for partially anonymous, partially unlinkable authentication. Read more about Information technology — Security techniques — Requirements for partially anonymous, partially unlinkable authentication.
Information technology — Security techniques — Privacy architecture framework Read more about Information technology — Security techniques — Privacy architecture framework
Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements Read more about Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements