BS ISO/IEC 27559:2022
$142.49
Information security, cybersecurity and privacy protection. Privacy enhancing data de-identification framework
Published By | Publication Date | Number of Pages |
BSI | 2022 | 32 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
7 | Foreword |
8 | Introduction |
9 | 1 Scope 2 Normative references 3 Terms and definitions |
11 | 4 Symbols and abbreviated terms 5 Overview |
12 | 6 Context assessment 6.1 General 6.2 Threat modelling 6.2.1 General |
13 | 6.2.2 Security and privacy practices 6.2.3 Motives and capacity to re-identify |
14 | 6.3 Transparency and impact assessment 6.3.1 General 6.3.2 Transparency of actions and stakeholder engagement 6.3.3 Privacy-related harms |
15 | 7 Data assessment 7.1 General 7.2 Data features 7.2.1 General 7.2.2 Data principals 7.2.3 Data type |
16 | 7.2.4 Attribute types 7.2.5 Dataset properties 7.3 Attack modelling 7.3.1 General |
17 | 7.3.2 Maximum or average risk 7.3.3 Population or sample-based attack 7.3.4 Data privacy models |
18 | 8 Identifiability assessment and mitigation 8.1 General 8.2 Assessing identifiability 8.2.1 General 8.2.2 Quantifying identifiability |
19 | 8.2.3 Adversarial testing |
20 | 8.3 Mitigation 8.3.1 General 8.3.2 Reconfiguring the environment 8.3.3 Transforming the data |
21 | 8.3.4 Re-evaluation 9 De-identification governance 9.1 General 9.2 Before data are made available 9.2.1 General 9.2.2 Assigning roles and responsibilities |
22 | 9.2.3 Establishing principles, policies and procedures 9.2.4 Identifying and managing a data disclosure |
23 | 9.2.5 Communicating with stakeholders 9.3 After data are made available 9.3.1 General 9.3.2 Monitoring the data environment 9.4 Mitigation in case of incident |
25 | Annex A (informative) Example identifiers |
27 | Annex B (informative) Example threshold identifiability benchmarks |
29 | Bibliography |