IEEE 7002-2022
$34.13
IEEE Standard for Data Privacy Process
Published By | Publication Date | Number of Pages |
IEEE | 2022 | 41 |
New IEEE Standard – Active. The requirements for a systems/software engineering process for privacy-oriented considerations regarding products, services, and systems utilizing employee, customer, or other external user’s personal data are defined by this standard. Organizations and projects that are developing and deploying products, systems, processes, and applications that involve personal information are candidate users of the IEEE Std 7002™ standard. Specific procedures, diagrams, and checklists are provided for users of the IEEE Std 7002 standard to perform conformity assessments on their specific privacy practices. Privacy impact assessments (PIAs) are described as a tool for both identifying where privacy controls and measures are needed and for confirming they are in place.
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | IEEE Std 7002™-2022 Front cover |
2 | Title page |
4 | Important Notices and Disclaimers Concerning IEEE Standards Documents |
8 | Participants |
9 | Introduction |
10 | Contents |
11 | 1. Overview 1.1 Scope 1.2 Purpose 1.3 Word usage |
12 | 2. Normative references 3. Definitions, acronyms, and abbreviations 3.1 Definitions |
15 | 3.2 Acronyms and abbreviations 4. Process overview and scene setting 4.1 Key terminology |
16 | 4.2 Guidance on using the standard 4.3 High level process |
20 | 5. Defining organizational privacy requirements 5.1 Overview 5.2 Regulatory context 5.3 Additional contextual factors |
21 | 6. Setting organizational privacy framework 6.1 General |
22 | 6.2 Organizational policies, procedures, and guidelines |
23 | 6.3 Roles and responsibilities |
24 | 6.4 Training 6.5 Governance and accountability functions |
25 | 7. Characterizing the system environment 7.1 Overview 7.2 Business need |
26 | 7.3 System functionality and design |
28 | 7.4 Risk assessment |
29 | 8. Privacy risk management 8.1 Responding to risks in the proposed system environment |
30 | 8.2 Privacy controls for risk mitigation |
32 | 8.3 Ongoing system privacy risk management |
33 | 9. Privacy in the systems development life cycle 9.1 General |
34 | 9.2 Privacy life cycle management |
36 | Annex A (informative) Examples A.1 Examples from Clause 5 A.2 Examples from Clause 6 |
37 | A.3 Examples from Clause 7 A.4 Examples from Clause 8 |
38 | A.5 General resources |
39 | Annex B (informative) Bibliography |
41 | Back cover |