Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 10 Next »

Resources and Attachments:

  File Modified
You are not logged in. Any changes you make will be marked as anonymous. You may want to Log In if you already have an account.
No files shared here yet.
  • Drag and drop to upload or browse for files
  • Privacy Principles:

    Discovery Resources

    Organization

    Version

    Framework/WG Name

    Liaison

    Type

    Lexicon

    Jurisdiction

    Scope

    Link

    Summary

    Status

    Notes & Analysis

    Kantara Initiative

     

    P3 - Privacy Framework (PF) WG

     

    Trust

     

     

     

    PFWG

     

    In development

     

    ISO(drafts)

     

    ISO 29100 Privacy Framework
    ISO  29101 Privacy Reference Architecture
    ISO 29190 Privacy Capability Framework

    Collin Wallis

     

     

     

    Global

     

    KI can comment when ext review sub com page set up.  

    29100 at FCD
    29101 at CD1
    29190 at 2ndWD and needs editor to take over RW's great work!

     

    ITU-T

     

    OIXa (200) Open Identity Trust Framework, [Online] http://openidentityexchange.org/sites/default/files/the-open-identity-trust-framework-model-2010-03.pdf [Accessed December 18, 2010]


     

     

     

     

     

     

     

     

    ABA

     

    Discussion Draft for Trust Framework

    Tom S.

     

    Y

     

     

     

     

    Initial draft for comment

    Includes example definitions

    FTC-Trust Framework

     

    FTC Staff Report (2010) A Proposed Framework For Businesses and Policy Makers, [Online] www.ftc.gov/os/2010/12/101201privacyreport.pdf [Accessed December 18, 2010]

     

     

     

     

     

     

     

     

     

    ITU-T

     

    Baseline identity management terms and
    definitions 

     

     

     

     

     

     

     

    T-REC-X.1252-201004-I!!PDF-E.pdf

     

    References

    (AICA/CICA) Summary of the HIPAA Privacy Rule --[Internet http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/index.html}

    CIPL, 2010) Demonstrating and Measuring Accountability  A Discussion Document  http://www.huntonfiles.com/files/webupload/CIPL_Accountability_Phase_II_Paris_Project.PDF

    COE (1980)  Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data (Council of Europe) http://www.privacy.org/pi/intl_orgs/coe/dp_convention_108.txt

    DHS U.S. Department of Homeland Security, Privacy Policy Guidance Memorandum (2008) (Memo. 2008-1)http://www.dhs.gov/xlibrary/assets/privacy/privacy_policyguide_2008-01.pdf

    FTC U.S. Federal Trade Commission http://www.ftc.gov/reports/privacy2000/privacy2000.pdf

    HEW U.S. Department of Health Education and Welfare “Records, Computers and the Rights of Citizens” issued by the Secretary's Advisory Committee on Automated Personal Data Systems; Elliot Richardson, Secretary of the Department of Health, Education and Welfare (1973)

    HHS U.S. Privacy Protection Study Commission “Protecting Privacy in an Information Society” (ch. 13). http://aspe.hhs.gov/datacncl/1977privacy/toc.htm

    ICAM  U.S. Identity Credential and Access Management Trust Framework Provider Adoption Process (TFPAP) For Levels of Assurance 1, 2, and Non-PKI 3, Version 1.0.1, Release Candidate September 4, 2009http://www.idmanagement.gov/documents/TrustFrameworkProviderAdoptionProcess.pd

    ISTPA, (2007) Analysis of Privacy Principals, pg. 64, [Online] http://www.istpa.org/ [Accessed Nov, 4 2010]

    Landau, S., Le Van Gong, H., and Wilton, R., (2009) Achieving Privacy in a Federated Identity Management System. Financial Cryptography and Data Security 2009, International Financial Cryptography Association 1, 14.

    NSTIC*(2010)* U.S. National Strategy for Trusted Identities in Cyberspace http://www.nstic.ideascale.com

    OECD:  Rundle, M., et Al ( Bob Blakley, Jeff Broberg, Anthony Nadalin, Dale Olds, Mary Ruddy, Marcelo Thompson Mello Guimarães, and Paul Trevithick)   (2008) At a Crossroads: Personhood and Digital Identity in the Information Society, Published Organisation for Economic Cooperation and Development (OECD)

    OECD, (1980) Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, [Online]  http://www.oecd.org/document/18/0,2340,en_2649_34255_1815186_1_1_1_1,00.html [Accessed April 1, 2011]

    Privacy International(2010) Avoiding the Privacy Apocalypse, [Internet Video]  , Google Tech Talk, presented by Simon Davies and Gus Hosein

    Reding, V, (Nov 4, 2010), European Commission sets out strategy to strengthen EU data protection rules, [Internet] http://europa.eu/rapid/pressReleasesAction.do?reference=IP/10/1462&format=HTML&aged=0&language=EN&guiLanguage=en  [Accessed Nov 4, 2010]

    Scott David,  OIX Tool,  Oct 12 FIPP Tool.doc\

    The Business Forum for Consumer Privacy, (2009) A Use and Obligation Approach to Protecting Privacy, [Online] http://www.huntonfiles.com/files/webupload/CIPL_Use_and_Obligations_White_Paper.pdf

    US. Dep’t of Commerce, (2010) Privacy Green Paper,[Accessed Dec 18, 2010

    Additional Reference in Notice Principle – Info RFC “draft-morris-policy-cons-00.txt“ [Internet] http://tools.ietf.org/html/draft-morris-policy-cons-00 [Accessed March 30, 2011]

    \

    • No labels