Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Migration of unmigrated content due to installation of a new plugin

...

Child pages (Children Display)
sorttitle
reversetrue

Discovery

...

Resources

APECPrivacyFramework.pdf

Organization

Version

Framework/WG Name

Liaison

Type

Lexicon

Jurisdiction

Scope

Link

Summary

Status

Notes & Analysis

APEC

 

 

 

 

 

 

 

 

 


 

US Dept. of Commerce

 

 

 

 

 

 

 

 

 

DoC Dynamic Privacy Framework.pdf

 

US Federal Trade Commission

 

 

 

 

 

 

 

 

 

FTC-A Proposed Framework for Business and Policymakers.pdf

 

 

 

 

 

 

 

 

 

 

 

 

Kantara Initiative

 

P3 - Privacy Framework (PF) WG

 

Trust

 

 

 

PFWG

 

In development

 

ISO(drafts)

 

ISO 29100 Privacy Framework
ISO  29101 Privacy Reference Architecture
ISO 29190 Privacy Capability Framework

Collin Wallis

 

 

 

Global

 

KI can comment when ext review sub com page set up.  

29100 at FCD
29101 at CD1
29190 at 2ndWD and needs editor to take over RW's great work!

 

NiST

 

 

 

 

 

 

 

 

 

 

 

OASIS

 

 

Susan Landau

 

 

 

 

 

 

 

 

OIX

 

 

Don T

 

 

 

 

 

 

 

 

ITU-T

 

OIXa (200) Open Identity Trust Framework, [Online] http://openidentityexchange.org/sites/default/files/the-open-identity-trust-framework-model-2010-03.pdf [Accessed December 18, 2010]


 

 

 

 

 

 

 

 

ABA

 

Discussion Draft for Trust Framework

Tom S.

 

Y

 

 

 

 

Initial draft for comment

Includes example definitions

In-Common

 

 

 

 

 

 

 

 

 

 

 

E-Citizen

 

 

 

 

 

 

 

 

 

 

 

NSTIC

 

 

Brett M?

 

 

 

 

 

 

 

 

NASPO

 

 

Anna Solomovic

 

 

 

 

 

 

 

 

FTC-Trust Framework

 

FTC Staff Report (2010) A Proposed Framework For Businesses and Policy Makers, [Online] www.ftc.gov/os/2010/12/101201privacyreport.pdf [Accessed December 18, 2010]

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

t

 

ITU-T

 

Baseline identity management terms and
definitions 

 

 

 

 

 

 

 

T-REC-X.1252-201004-I!!PDF-E.pdf

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Table 3: Landscape Documents & Lexicons - (These are documents that aid frameworks or the development of requirements)

...

Author

...

Document Name, Year, Link, Version, Publisher

...

Lexicon

...

Notes & Analysis

...

ISTPA

References

(AICA/CICA) Summary of the HIPAA Privacy Rule --[Internet http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/index.html}

CIPL, 2010) Demonstrating and Measuring Accountability  A Discussion Document  http://www.huntonfiles.com/files/webupload/CIPL_Accountability_Phase_II_Paris_Project.PDF

COE (1980)  Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data (Council of Europe) http://www.privacy.org/pi/intl_orgs/coe/dp_convention_108.txt

DHS U.S. Department of Homeland Security, Privacy Policy Guidance Memorandum (2008) (Memo. 2008-1)http://www.dhs.gov/xlibrary/assets/privacy/privacy_policyguide_2008-01.pdf

FTC U.S. Federal Trade Commission http://www.ftc.gov/reports/privacy2000/privacy2000.pdf

HEW U.S. Department of Health Education and Welfare “Records, Computers and the Rights of Citizens” issued by the Secretary's Advisory Committee on Automated Personal Data Systems; Elliot Richardson, Secretary of the Department of Health, Education and Welfare (1973)

HHS U.S. Privacy Protection Study Commission “Protecting Privacy in an Information Society” (ch. 13). http://aspe.hhs.gov/datacncl/1977privacy/toc.htm

ICAM  U.S. Identity Credential and Access Management Trust Framework Provider Adoption Process (TFPAP) For Levels of Assurance 1, 2, and Non-PKI 3, Version 1.0.1, Release Candidate September 4, 2009http://www.idmanagement.gov/documents/TrustFrameworkProviderAdoptionProcess.pd

ISTPA, (2007) Analysis of Privacy Principals

...

, pg. 64, [Online] http://www.istpa.org/

...

Yes

Table on pg.  64,

...

[Accessed Nov, 4 2010]

Landau, S., Le Van Gong, H., and Wilton, R., (2009) Achieving Privacy in a Federated Identity Management System. Financial Cryptography and Data Security 2009, International Financial Cryptography Association 1, 14.

NSTIC*(2010)* U.S. National Strategy for Trusted Identities in Cyberspace http://www.nstic.ideascale.com

OECD:  Rundle, M., et Al ( Bob Blakley, Jeff Broberg, Anthony Nadalin, Dale Olds, Mary Ruddy, Marcelo Thompson Mello Guimarães, and Paul Trevithick)   (2008) At a Crossroads: Personhood and Digital Identity in the Information Society, Published Organisation for Economic Cooperation and Development (OECD)

OECD, (1980) Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, [Online]  http://www.

...

oecd.org/

...

Susan Landau

...

Achieving Privacyin aFederated Identity ManagementSystem

...

 

...

 

...

document/18/0,2340,en_2649_34255_1815186_1_1_1_1,00.html [Accessed April 1, 2011]

Privacy International(2010) Avoiding the Privacy Apocalypse, [Internet Video]  , Google Tech Talk, presented by Simon Davies and Gus Hosein

Reding, V, (Nov 4, 2010), European Commission sets out strategy to strengthen EU data protection rules, [Internet] http://europa.eu/rapid/pressReleasesAction.do?reference=IP/10/1462&format=HTML&aged=0&language=EN&guiLanguage=en  [Accessed Nov 4, 2010]

Scott David,  OIX Tool,  Oct 12 FIPP Tool.doc\

The Business Forum for Consumer Privacy, (2009) A Use and Obligation Approach to Protecting Privacy, [Online] http://www.huntonfiles.com/files/webupload/CIPL_Use_and_Obligations_White_Paper.pdf

US. Dep’t of Commerce, (2010) Privacy Green Paper,[Accessed Dec 18, 2010

Additional Reference in Notice Principle – Info RFC “draft-morris-policy-cons-00.txt“ [Internet] http://tools.ietf.org/html/draft-morris-policy-cons-00 [Accessed March 30, 2011]

\