• There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

BS ISO/IEC 15944-8:2012

Current
Current

The latest, up-to-date edition.

Information technology. Business Operational View Identification of privacy protection requirements as external constraints on business transactions
Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

30-04-2012

Foreword
0 Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviations
5 Fundamental principles and assumptions
   governing privacy protection requirements
   in business transactions involving
   individuals (external constraints perspective)
6 Collaboration space and privacy protection
7 Public policy requirements of jurisdictional domains
8 Principles and rules governing the establishment,
   management and use of identities of an individual
9 Person component - individual sub-type
10 Process component
11 Data component
12 Template for identifying privacy protection
   requirements on business transactions
13 Conformance statement
Annex A (normative) - Consolidated list of terms and
        definitions with cultural adaptability: ISO
        English and ISO French language equivalency
Annex B (normative) - Consolidated set of rules in
        existing Parts of ISO/IEC 15944 of particular
        relevance to privacy protection requirements as
        external constraints on business transactions
Annex C (normative) - Business Transaction Model
        (BTM): Classes of constraints
Annex D (normative) - Integrated set of information
        life cycle management (ILCM) principles in
        support of information law compliance
Annex E (normative) - Key existing concepts and
        definitions applicable to the establishment,
        management, and use of identities of a single
        individual
Annex F (normative) - Coded domains for specifying
        state change and record retention management in
        support of privacy protection requirements
Bibliography

Provides support to modelling generic international requirements for identifying and providing privacy protection of personal information throughout any kind of information and communications technology (ICT) based business transaction where the individual has the role of a buyer.

1.1 Statement of scope This part of ISO/IEC15944: provides method(s) for identifying, in Open-edi modelling technologies and development of scenarios, the additional requirements in Business Operational View (BOV) specifications for identifying the additional external constraints to be applied to recorded information in business transactions relating to personal information of an individual, as required by legal and regulatory requirements of applicable jurisdictional domains having governance over the personal information exchanged among parties to a business transaction; integrates existing normative elements in support of privacy and data protection requirements as are already identified in the current editions of ISO/IEC14662 and ISO/IEC15944-1, ISO/IEC15944-2, ISO/IEC15944-4, and ISO/IEC15944-5 which apply to information concerning identifiable living individuals as buyers17 in a business transaction or whose personal information is used in the transaction; provides overarching operational ‘best practice’ statements for associated (and not necessarily automated) processes, procedures, practices and governance requirements that must act in support of implementing and enforcing technical mechanisms needed to support privacy/data protection requirements necessary for the implementation in Open-edi transaction environments; identifies and provides a sample scenario and implementation (use case) for one or more use cases of privacy/data protection in business transactions; and, provides guidelines on the need for procedural mechanisms in the event that mandatory disclosure rules of transactional information must be implemented. This part of ISO/IEC15944 is a BOV-related standard which addresses basic (or primitive) requirements of a privacy protection environment, as legal requirements represented through jurisdictional domains, on business transactions, and also integrates the requirements of the information technology and telecommunications environments. This part of ISO/IEC15944 contains a methodology and tool for specifying common classes of external constraints through the construct of \'jurisdictional domains\'. It meets the requirements set in ISO/IEC15944-1 and ISO/IEC15944-2 through the use of explicitly stated rules, templates, and Formal Description Techniques (FDTs). 1.2 Exclusions 1.2.1 Functional Services View (FSV) This part of ISO/IEC15944 focuses on the BOV aspects of a business transaction, and does not concern itself with the technical mechanisms needed to achieve the business requirements (the FSV aspects, including the specification of requirements of a Functional Services View (FSV) nature which include security techniques and services, communication protocols, etc.). The FSV includes any existing standard (or standards development of an FSV nature), which have been ratified by existing ISO, IEC, UN/ECE and/or ITU standards. 1.2.2 Internal behaviour of organizations (and public administration) Excluded from the scope of this part of ISO/IEC15944 is the application of privacy protection requirements within an organization itself. The Open-edi Reference Model, considers these to be internal behaviours of an organization and thus not germane to business transactions (which focus on external behaviours pertaining to electronic data interchange among the autonomous parties to a business transaction). As such, excluded from the scope of this part of ISO/IEC15944 are any: internal use and management of recorded information pertaining to an identifiable organization Person an organization (or public administration) within an organization; and, implementation of internal information management controls, internal procedural controls or operational controls within an organization or public administration necessary for it to comply with applicable privacy requirements that may be required in observance of their lawful or contractual rights, duties and obligations as a legal entity in the jurisdictional domain(s) of which they are part. This should not be taken to mean that an organization could not adapt this part of ISO/IEC15944 in order to model internal behaviour if they so wished, say when moving personal data within the organization. 1.2.3 “organization Person?? From a public policy privacy protection requirements perspective, an “organization Person?? is a “natural person?? who acts on behalf of and makes commitments on behalf of the organization (or public administration) of which that natural person is an “organization part??. But, as an “organization Person, they do not attract inherent rights to privacy. Privacy protection requirements which do apply to an organization Person are placed in an employee-employer context with associated contractual elements. In addition, some jurisdictional domains have privacy protection laws and regulations which apply specifically to employees of their public administrations. As such, from a business transaction perspective, it is an internal behaviour of an organization, as to who makes commitments on behalf of an organization or public administration. How and why organization Persons make decisions and commitments is not germane to the scope and purpose of this part of ISO/IEC15944. {See further ISO/IEC15944-1:2011, Clause6.2 “Person and external constraints: Individual, organization, and public administration?? as well as its Figure17 “Illustration of commitment exchange versus information exchange for organization, organization part(s) and organization Person(s)??} 1.2.4 Overlap of and/or conflict among jurisdictional domains as sources of privacy protection requirements A business transaction requires an exchange of commitments among autonomous parties. Commitment is the making or accepting of a right, an obligation, liability or responsibility by a Person. In the context of a business transaction, the making of commitments pertains to the transfer of a good, service and/or right among the Persons involved. Consequently, it is not an uncommon occurrence, depending on the goal and nature of the business transaction, that the Persons (and parties associated) are in different jurisdictional domains, and that multiple sets of external constraints apply, and overlap will occur. It is also not an uncommon occurrence that there is overlap among such sets of external constraints and/or conflict among them. This is also the case with respect to laws and regulations of a privacy protection nature. Resolving issues of this nature is outside the scope of this part of ISO/IEC15944. However, modelling business transaction as scenarios and scenario components as re-useable business objects may well serve as a useful methodology for identifying specific overlaps and conflicts (thereby serving as a tool for their harmonization, if only within the context of a specific transaction). The application of business semantic descriptive techniques to laws, regulations, etc., of jurisdictional domains and their modelling of such sets of external constraints as scenarios and scenario components is an essential step to their application in a systematic manner to (electronic) business transactions (and especially e-government, e-commerce, e-education, etc.). Open-edi business agreement descriptive techniques methodologies can serve as a tool in the harmonization and simplification of external constraints arising from jurisdictional domains. NOTE This part of ISO/IEC15944 is based on the following assumptions: the privacy protection requirements of the individual, as a buyer in a business transaction, are those of the jurisdictional domain in which the individual made the commitments associated with the instantiated business transaction; and, where the seller is in a jurisdictional domain other than that of the individual, as the buyer, this edition of ISO/IEC15944 incorporates and supports the “OECD Guidelines on the Protection of Privacy and Transborder Data Flows of Personal Data??.[See further below Clause2.2] 1.2.5 Publicly available personal information Excluded from the scope of this part of ISO/IEC15944 is “publicly available personal information?? (PAPI). In a business transaction context, the seller does not collect personal information of this nature from the individual (particularly in the “planning phase?? of the business transaction process). For example, the seller in advertising product to the market may: publish personal information that is publicly available personal information, such as that found in telephone directories; make use of any personal information declared to be of a public information by a regulation based on an law or regulation of the applicable jurisdictional domain; and, or, include that which the individual itself chose to make public, (e.g., via one or more Internet based applications such as “Facebook??). In a privacy protection context, publicly available personal information is defined as follows: publicly available personal information (PAPI) personal information about an individual that the individual knowingly makes or permits to be made available to the public, or is legally obtained and accessed from: (a) government records that are available to the public; or, (b) information required by law to be made available to the public EXAMPLE1 Examples of personal information which an individual knowingly makes or permits to be made available include public telephone directories, advertisements in newspapers, published materials, postings of a similar nature on the internet, etc. EXAMPLE2 Examples of government records that are publicly available include registers of individuals who are entitled to vote, buy or sell a property, or any other personal information that a jurisdictional domain requires to be publicly available, etc. Further, determining whether or not personal information is of a “PAPI?? nature is also excluded from the scope of this part of ISO/IEC15944. 1.3 Aspects currently not addressed This part of ISO/IEC15944 focuses on the essential and basic aspects of privacy protection requirements. The purpose of this Clause is to identify aspects not currently addressed. These will be addressed in either: an Amendment to this part of ISO/IEC15944, new editions of this part of ISO/IEC15944, through a new part of ISO/IEC15944, in a new edition of an existing part of ISO/IEC15944 (as may be applicable), through a new edition of an existing standard of ISO/IEC JTC1, or another existing ISO/IEC JTC1/SC, or ISO, IEC or ITU; and/or, new standard(s) by any of the above noted committees. ISO/IEC15944-8 also does yet address the following requirements: differences in equality in the use of official languages by an individual, in being informed and exercising privacy protection rights within a jurisdictional domain18; interworking between privacy protection and consumer protection requirements as two sets of external constraints applicable to an individual as a buyer in a business transaction; identification and registration of schemas involving the control and management of legally recognized names (LRNs) as personas and associated unique identifiers for the unambiguous identification of an individual and/or the role qualification of an individual in a specific context; more detailed information management and audit requirements pertaining to ensuring privacy protection of personal information that should be enacted by and among organizations and public administrations as parties to a business transaction; more detailed rules and associated text pertaining to the BOV perspective with respect to transborder data flows of personal information; inter-operation between jurisdictional domains where they do not possess defined equivalents to their protection requirements (interoperability) or where protection requirements simply are different; instances in which privacy protection requirements continue to apply to the personal information of an individual after his/her death; In addition, from a business transaction perspective, there may be some continuity in privacy protection requirements, (e.g., those pertaining to temporal aspects of post-actualization aspects of an instantiated business transaction, (e.g., health care matters, warranties on products, service contracts, rights (including IP), etc.). Instantiated business transactions may require personal information to be retained and continue to be protected following the death of the individual. NOTE1 This may also include a settlement of wills, probate, investments, etc., pertaining to that individual once proved deceased. NOTE2 Tax information filed has 4-6years record retention requirements in most jurisdictional domains. In some jurisdictional domains, tax matters are confidential and in others they are public. The status of personal information may change as a result of litigation and public hearings. NOTE3 Instantiated business transactions may require personal information to be retained and continue to be protected following the death of an individual, (e.g., many credit card agreements exist after the death of the credit card holder). NOTE4 One may need to have an added Clause on privacy protection of personal information on individuals consequent upon the death of the individual. personal information found in journalistic reports: The use of personal information in a business transaction which is found in journalistic reports including news items, public broadcasts, items published by news media about an individual, personal information published and made available by third parties on the internet, (e.g., via Google, Facebook, Twitter, etc.), which in some jurisdictional domains is held to be “in the public interest??, is not included in this part of ISO/IEC15944. The reasons for exclusion are that a journalistic report containing personal information about an individual: may contain inaccurate information, allegations, and thus should not (can not) be used as “personal information??; may be subject to libel and other legal actions by the individual; etc. Further issues pertaining to privacy protection versus journalistic reports on identified individuals resulting in the publishing of personal information is a “grey area?? which courts in various jurisdictional domains are addressing and thus not yet resolved; this part of ISO/IEC15944 does not address the question of negotiated consent, but rather considers the simplest case, that a scenario may be registered which includes a specific form of consent within it; the use of biological characteristics and attributes of an individual which require the physical presence of an individual and are physically “taken?? from an individual in a particular context and for a specified role action of an individual; These include the use of biometrics, biological (such as hair, blood, DNA samples), dentistry records, etc. the application of the rights of individuals who are disabled as stated in the “UN Convention on the Rights of Persons with Disabilities?? (2006)19; Of particular importance here is that this UN Convention takes as its basis the need to support individuals with disabilities to be a fully functioning member of society means that information necessary for these individuals to be able to make commitments including the undertaking of business transactions shall be made available in a form and format so that the semantics are fully communicated, the individual is able to have informed consent, etc. this part of ISO/IEC15944 does not address the role of an “ombudsperson??, “Privacy Commissioner??, a “Data Protection Commissioner??, etc., who serves as an independent adjudicator of complaints and ensures compliance with privacy protection requirements (including of internally of the organization or public administration themselves); Many jurisdictional domains provide for the role of an ombudsperson which may be a role similar in application to public administration. detailed rules pertaining to the use of agents and/or third parties by a seller in a business transaction This includes their qualification and assurance of compliance with applicable privacy protection requirements for the personal information pertaining to a business transaction. an agent acting on behalf of an individual An individual may request an agent to act on its behalf and this may or may not include the individual to require the agent not to reveal the individual identity or any personal information about the individual, i.e., as an anonymous “client?? of the agent. detailed rules governing the requirement to tag (or label) at the data elements (or field) level which form part of personal information of an individual generally as is required for as the business transactions(s) and its associated BTI(s); mergers and acquisitions It is presumed that when an organization “A?? merges with, or is acquired by another organization “B??, that the privacy protection requirements applicable to personal information under the control of organization “A?? continue to apply and be enforced. It is also assumed the personal information under the control of organization “A?? remains under its control and that a merger with or acquisition by organization “B?? does not allow organization “B?? to access and/or use personal information held by organization “A?? without the express and informed consent of the individuals whose personal information is/was organization “A??. ICT and other service providers It is presumed that any ICT (or other) services provider which is under contract to provide ICT services to an organization or public administration (which has personal information under its control) shall not access or use such personal information processed as part of its services offering to that organization, unless it has a formal contractual arrangement to do so, in compliance with applicable privacy protection requirements. data mining It is also presumed that an organization shall ensure that any data mining activities undertaken by itself (or via an agent or third party on its behalf) shall be in compliance with applicable privacy protection requirements, and not involve any secondary use or any other use of personal information for which the individual(s) concerned have not provided explicitly informed consent. formal Conformance Statements Clause13 below deals with conformance requirements at the most primitive level only. More detailed conformance statements with associated rules and procedures are required in implementation. It is also necessary to ensure that any such conformance statement, i.e., declaration by an organization or public administration is “verifiable??. linkages and similarities between privacy protection and consumer protection requirements Many of the external constraints pertaining to personal information of a privacy protection nature in a business transaction are similar to consumer protection requirements. {See further below Clause7.2.2} It is anticipated that some or all of these requirements will be addressed in future editions of ISO/IEC15944-8 or in companion standards or technical reports (including possible new parts of ISO/IEC15944). 1.4 IT-systems environment neutrality This part of ISO/IEC15944 does not assume nor endorse any specific system environment, database management system, database design paradigm, system development methodology, data definition language, command language, system interface, user interface, syntax, computing platform, or any technology required for implementation, i.e., it is information technology neutral. At the same time, this part of ISO/IEC15944 maximizes an IT-enabled approach to its implementation and maximizes semantic interoperability.

Committee
IST/40
DevelopmentNote
Supersedes 10/30180220 DC. (04/2012)
DocumentType
Standard
Pages
244
PublisherName
British Standards Institution
Status
Current
Supersedes

Standards Relationship
ISO/IEC 15944-8:2012 Identical

ISO/TS 25237:2008 Health informatics Pseudonymization
ISO/IEC 15944-1:2011 Information technology Business operational view Part 1: Operational aspects of open-edi for implementation
ISO 22857:2013 Health informatics — Guidelines on data protection to facilitate trans-border flows of personal health data
ISO 1087-1:2000 Terminology work Vocabulary Part 1: Theory and application
ISO/IEC 7812-2:2017 Identification cards — Identification of issuers — Part 2: Application and registration procedures
ISO/IEC 11179-3:2013 Information technology — Metadata registries (MDR) — Part 3: Registry metamodel and basic attributes
ISO/IEC 15944-4:2015 Information technology Business operational view Part 4: Business transaction scenarios Accounting and economic ontology
ISO/IEC 7501-2:1997 Identification cards — Machine readable travel documents — Part 2: Machine readable visa
ISO 5127:2017 Information and documentation Foundation and vocabulary
ISO/IEC TR 15944-6:2015 Information technology Business operational view Part 6: Technical introduction to e-Business modelling
ISO/IEC 15944-7:2009 Information technology Business operational view Part 7: eBusiness vocabulary
ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
ISO 19108:2002 Geographic information Temporal schema
ISO/IEC 14662:2010 Information technology Open-edi reference model
ISO/IEC 6523-1:1998 Information technology — Structure for the identification of organizations and organization parts — Part 1: Identification of organization identification schemes
ISO/IEC 19501:2005 Information technology — Open Distributed Processing — Unified Modeling Language (UML) Version 1.4.2
ISO 3166-2:2013 Codes for the representation of names of countries and their subdivisions Part 2: Country subdivision code
ISO 19115:2003 Geographic information Metadata
ISO 8601:2004 Data elements and interchange formats Information interchange Representation of dates and times
ISO/IEC 15944-5:2008 Information technology Business operational view Part 5: Identification and referencing of requirements of jurisdictional domains as sources of external constraints
ISO 639-2:1998 Codes for the representation of names of languages — Part 2: Alpha-3 code
ISO/IEC 7501-1:2008 Identification cards Machine readable travel documents Part 1: Machine readable passport
ISO/IEC 10181-2:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework
ISO/IEC 7501-3:2005 Identification cards — Machine readable travel documents — Part 3: Machine readable official travel documents
ISO 19135:2005 Geographic information — Procedures for item registration
ISO/IEC 7812-1:2017 Identification cards — Identification of issuers — Part 1: Numbering system
ISO 3166-1:2013 Codes for the representation of names of countries and their subdivisions Part 1: Country codes
ISO/IEC 6523-2:1998 Information technology — Structure for the identification of organizations and organization parts — Part 2: Registration of organization identification schemes
ISO/IEC 15944-2:2015 Information technology Business operational view Part 2: Registration of scenarios and their components as business objects
ISO/IEC 5218:2004 Information technology Codes for the representation of human sexes
ISO 15489-1:2016 Information and documentation Records management Part 1: Concepts and principles
ISO/IEC TR 15285:1998 Information technology An operational model for characters and glyphs
ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General
ISO/IEC TR 13335-1:1996 Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT Security

View more information
£400.00
Excluding VAT

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.