1 |
ISO/IEC 29134:2017, Privacy Impact Assessment - Methodology
|
2 |
ISO/IEC 29151:2017, Code of practice for the protection of personally identifiable information, 2017.8
|
3 |
WG 5/SD 5, Explanation on the use of ISO/IEC 27001 (ISMS) for privacy management, 2015.8
|
4 |
ISO/IEC JTC 1/SC 27, Information security, cybersecurity, privacy protection, http://www.iso.org/iso/iso_technical_committee?commid=45306
|
5 |
WG 5/SD 1, WG 5 Roadmap, 2019.4
|
6 |
염흥열, "개인정보보호 관리체계 국제 표준화 필요성," 정보보호학회지, 제23권 제4호, pp.65-72, 2013.8
|
7 |
염흥열, "개인정보보호 기술 및 국제표준 동향," OSIA Standards & Technology Review Journal, June 2014, Vol.27, No.2
|
8 |
염흥열, 개인정보보호 국제표준화 분석, 한국정보보호학회 학회지, 제25권 제4호, pp.5-9, 2015.8
|
9 |
ISO/IEC IS 27552, Enhancement to ISO/IEC 27001 for privacy management - Requirements, 2019.8.
|
10 |
ISO/IEC 20889:2018, Information technology - Security techniques - Privacy enhancing data de-identification terminology and classification of techniques
|
11 |
행정안전부, 방송통신위원회 등, "비식별화조치 가이드라인," 2016.6.30.
|
12 |
ISO/IEC 29184, Guidelines for online privacy notices and consent, 2019.07
|
13 |
ISO/IEC TS 29003:2018, Identity proofing
|
14 |
염흥열, 국제 개인정보보호 표준화 동향 분석(2016년 4월 탬퍼 SC27 회의 결과를 중심으로), 정보보호학회지, v.26, no.4, 6-10, 2016.8
|
15 |
EU, GDPR (general data protection regulation), 27 April 2016
|
16 |
ISO/IEC 1st PDTS 27570, Privacy guidelines for smart cities
|
17 |
ISO/IEC 2nd WD, 27555, Establishing a PII deletion concept in organizations
|
18 |
WG 5/SD 2, SC 27/WG 5 Standing Document 2 (WG 5 SD2) -- Privacy references list , 2019.8
|
19 |
ISO/IEC 2nd WD, 27556, User-centric framework for PII handling based on privacy preferences
|
20 |
염흥열, 국제 개인정보보호 표준화 동향 분석(2017년 4월 해밀턴 SC27 회의 결과를 중심으로)), 한국정보보호학회 학회지, 제27권 제5호, pp.6-11, 2017.10
|
21 |
법제처, 정보통신망이용촉진 및 정보보호 등에 관한 법
|
22 |
BS 10012:2009, Data protection -Specification for a personal information management system, BSI, 2009
|
23 |
KCS.KO-12.0001, 개인정보보호관리체계(PIMS), 2011
|
24 |
법제처, 개인정보보호법
|
25 |
ISO/IEC 27000:2014, Information security management systems - Overview and vocabulary
|
26 |
ISO/IEC 27001:2013, Information technology - Security techniques - Information security management systems - Requirements
|
27 |
ISO/IEC 27002:2013, Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management system
|
28 |
ISO/IEC 27005:2011, Information security risk management
|
29 |
ISO/IEC 27009: 2016, Information technology - Security techniques - Sector specific application of ISO/IEC 27001 - Requirements
|
30 |
ISO/IEC 27011, Information security management guidelines for telecommunications organizations based on ISO/IEC 27002
|
31 |
ISO/IEC 27017:2016, Code of practice for information security controls based on ISO/IEC 27002 for cloud services
|
32 |
ISO/IEC 27018:2014, Code of practice for protection of personally identifiable information (PII) in public clouds acting as PIII processors
|
33 |
ISO/IEC 29100:2011, Information technology - Security techniques - Privacy framework
|
34 |
ISO/IEC 29190:2015, Information technology - Security techniques - Information technology -- Security techniques -- Privacy capability assessment model
|