Vážení zákazníci, v letošním roce budeme expedovat poslední objednávky ve středu 18. 12. 2024.

Těšíme se s vámi na shledanou od pondělí 06. 01. 2025.

 

Cena s DPH / bez DPH
Hlavní stránka>BS ISO/IEC 27555:2021 Information security, cybersecurity and privacy protection. Guidelines on personally identifiable information deletion
Sponsored link
sklademVydáno: 2021-10-18
BS ISO/IEC 27555:2021 Information security, cybersecurity and privacy protection. Guidelines on personally identifiable information deletion

BS ISO/IEC 27555:2021

Information security, cybersecurity and privacy protection. Guidelines on personally identifiable information deletion

Formát
Dostupnost
Cena a měna
Anglicky Zabezpečené PDF
K okamžitému stažení
7998 Kč
Čtěte normu po dobu 1 hodiny. Více informací v kategorii E-READING
Čtení normy
na 1 hodinu
799.80 Kč
Čtěte normu po dobu 24 hodin. Více informací v kategorii E-READING
Čtení normy
na 24 hodin
2399.40 Kč
Anglicky Tisk
Skladem
7998 Kč
Označení normy:BS ISO/IEC 27555:2021
Počet stran:34
Vydáno:2021-10-18
ISBN:978 0 539 03439 4
Status:Standard
Popis

BS ISO/IEC 27555:2021


This standard BS ISO/IEC 27555:2021 Information security, cybersecurity and privacy protection. Guidelines on personally identifiable information deletion is classified in these ICS categories:
  • 35.030 IT Security

This document contains guidelines for developing and establishing policies and procedures for deletion of personally identifiable information (PII) in organizations by specifying:

  • a harmonized terminology for PII deletion;

  • an approach for defining deletion rules in an efficient way;

  • a description of required documentation;

  • a broad definition of roles, responsibilities and processes.

This document is intended to be used by organizations where PII is stored or processed.

This document does not address:

  • specific legal provision, as given by national law or specified in contracts;

  • specific deletion rules for particular clusters of PII that are defined by PII controllers for processing PII;

  • deletion mechanisms;

  • reliability, security and suitability of deletion mechanisms;

  • specific techniques for de-identification of data.