Cena s DPH / bez DPH
Hlavní stránka>BS EN ISO/IEC 27018:2020 Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
sklademVydáno: 2020-06-10
BS EN ISO/IEC 27018:2020 Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors

BS EN ISO/IEC 27018:2020

Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors

Formát
Dostupnost
Cena a měna
Anglicky Zabezpečené PDF
K okamžitému stažení
7320 Kč
Čtěte normu po dobu 1 hodiny. Více informací v kategorii E-READING
Čtení normy
na 1 hodinu
732.00 Kč
Čtěte normu po dobu 24 hodin. Více informací v kategorii E-READING
Čtení normy
na 24 hodin
2196.00 Kč
Anglicky Tisk
Skladem
7320 Kč
Označení normy:BS EN ISO/IEC 27018:2020
Počet stran:36
Vydáno:2020-06-10
ISBN:978 0 539 06992 1
Status:Standard
Popis

BS EN ISO/IEC 27018:2020


This standard BS EN ISO/IEC 27018:2020 Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors is classified in these ICS categories:
  • 35.030 IT Security
  • 35.040.50 Automatic identification and data capture techniques

This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in line with the privacy principles in ISO/IEC 29100 for the public cloud computing environment.

In particular, this document specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for the protection of PII which can be applicable within the context of the information security risk environment(s) of a provider of public cloud services.

This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which provide information processing services as PII processors via cloud computing under contract to other organizations.

The guidelines in this document can also be relevant to organizations acting as PII controllers. However, PII controllers can be subject to additional PII protection legislation, regulations and obligations, not applying to PII processors. This document is not intended to cover such additional obligations.