Review Meeting(s): TBD
Status:
Item | Description |
---|
Statement (Single phrase or sentence) | Verifiers shall adopt appropriate measures to ensure the security of stored PII. |
Description | If storage is required, Verifiers shall implement privacy by design and by default techniques (e.g., anonymization or psedonymization of data). |
Scope (applies to) | - Part A: Verifiers
- Part B: Issuers
- Part C: Providers
|
Select the Primary Consideration* | |
- PL (Purpose legitimacy and specification)
|
- CL (Collection limitation)
|
- UR (Use, retention, and disclosure limitation)
|
- AQ (Accuracy and quality)
|
- OT (Openness, transparency, and access)
|
- IA (Individual access & participation)
|
- IS (Information Security)
|
|
Reference | 12_A_IS |
Select other relevant considerations | |
- PL (Purpose legitimacy and specification)
|
- CL (Collection limitation)
|
- UR (Use, retention, and disclosure limitation)
|
- AQ (Accuracy and quality)
|
- OT (Openness, transparency, and access)
|
- IA (Individual access & participation)
|
- IS (Information Security)
|
|
Select impacted Identifiers | |
Reference (#_Scope_Consideration_Ref #) |
Related Requirements |
|
Explanatory Notes (Text or Link) |
|
*For descriptions download the publicly available version of ISO/IEC 29100
...