1 |
BS 10012:2009, Data protection -Specification for a personal information management system, BSI, 2009
|
2 |
KCS.KO-12.0001, 개인정보보호관리체계(PIMS), 2011
|
3 |
법제처, 개인정보보호법
|
4 |
법제처, 정보통신망이용촉진 및 정보보호 등에 관한 법
|
5 |
ISO/IEC 27000:2009, Information security management systems - Overview and vocabulary
|
6 |
ISO/IEC 27001:2013, Information technology - Security techniques - Information security management systems - Requirements
|
7 |
ISO/IEC 27002:2013, Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management system
|
8 |
ISO/IEC 27005:2011, Information security risk management
|
9 |
ISO/IEC DIS 27009, TInformation technology - Security techniques - Sector specific application of ISO/IEC 27001 - Requirements
|
10 |
ISO/IEC 27011, Information security management guidelines for telecommunications organizations based on ISO/IEC 27002
|
11 |
ISO/IEC FDIS 27017, Code of practice for information security controls based on ISO/IEC 27002 for cloud services
|
12 |
ISO/IEC 27018, Code of practice for protection of personally identifiable information (PII) in public clouds acting as PIII processors
|
13 |
ISO/IEC 29100(2011), Information technology - Security techniques - Privacy framework
|
14 |
ISO/IEC FDIS 29190, Information technology - Security techniques - Information technology -- Security techniques -- Privacy capability assessment model
|
15 |
ISO/IEC 1st CD 29134, Privacy Impact Assessment - Methodology, 2014.5
|
16 |
ISO/IEC 1st CD 29151, Code of practice for the protection of personally identifiable information, 2014.4
|
17 |
WG 5/SD 5, Explanation on the use of ISO/IEC 27001 (ISMS) for privacy management, 2015.8
|
18 |
ISO/IEC JTC 1/SC 27 IT Security techniques, http://www.iso.org/iso/iso_technical_committee?commid=45306
|
19 |
WG 5/SD 1, WG 5 Roadmap, 2014.4
|
20 |
염흥열, "개인정보보호 관리체계 국제 표준화 필요성," 정보보호학회지, 제23권 제4호, pp.65-72, 2013.8
|
21 |
염흥열, "개인정보보호 기술 및 국제표준 동향," OSIA Standards & Technology Review Journal * June 2014, Vol.27, No.2
|