Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 10 Next »

Resources and Attachments:

  File Modified
No files shared here yet.

Privacy Principles:

Discovery Resources

Organization

Version

Framework/WG Name

Liaison

Type

Lexicon

Jurisdiction

Scope

Link

Summary

Status

Notes & Analysis

Kantara Initiative

 

P3 - Privacy Framework (PF) WG

 

Trust

 

 

 

PFWG

 

In development

 

ISO(drafts)

 

ISO 29100 Privacy Framework
ISO  29101 Privacy Reference Architecture
ISO 29190 Privacy Capability Framework

Collin Wallis

 

 

 

Global

 

KI can comment when ext review sub com page set up.  

29100 at FCD
29101 at CD1
29190 at 2ndWD and needs editor to take over RW's great work!

 

ITU-T

 

OIXa (200) Open Identity Trust Framework, [Online] http://openidentityexchange.org/sites/default/files/the-open-identity-trust-framework-model-2010-03.pdf [Accessed December 18, 2010]


 

 

 

 

 

 

 

 

ABA

 

Discussion Draft for Trust Framework

Tom S.

 

Y

 

 

 

 

Initial draft for comment

Includes example definitions

FTC-Trust Framework

 

FTC Staff Report (2010) A Proposed Framework For Businesses and Policy Makers, [Online] www.ftc.gov/os/2010/12/101201privacyreport.pdf [Accessed December 18, 2010]

 

 

 

 

 

 

 

 

 

ITU-T

 

Baseline identity management terms and
definitions 

 

 

 

 

 

 

 

T-REC-X.1252-201004-I!!PDF-E.pdf

 

References

(AICA/CICA) Summary of the HIPAA Privacy Rule --[Internet http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/index.html}

CIPL, 2010) Demonstrating and Measuring Accountability  A Discussion Document  http://www.huntonfiles.com/files/webupload/CIPL_Accountability_Phase_II_Paris_Project.PDF

COE (1980)  Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data (Council of Europe) http://www.privacy.org/pi/intl_orgs/coe/dp_convention_108.txt

DHS U.S. Department of Homeland Security, Privacy Policy Guidance Memorandum (2008) (Memo. 2008-1)http://www.dhs.gov/xlibrary/assets/privacy/privacy_policyguide_2008-01.pdf

FTC U.S. Federal Trade Commission http://www.ftc.gov/reports/privacy2000/privacy2000.pdf

HEW U.S. Department of Health Education and Welfare “Records, Computers and the Rights of Citizens” issued by the Secretary's Advisory Committee on Automated Personal Data Systems; Elliot Richardson, Secretary of the Department of Health, Education and Welfare (1973)

HHS U.S. Privacy Protection Study Commission “Protecting Privacy in an Information Society” (ch. 13). http://aspe.hhs.gov/datacncl/1977privacy/toc.htm

ICAM  U.S. Identity Credential and Access Management Trust Framework Provider Adoption Process (TFPAP) For Levels of Assurance 1, 2, and Non-PKI 3, Version 1.0.1, Release Candidate September 4, 2009http://www.idmanagement.gov/documents/TrustFrameworkProviderAdoptionProcess.pd

ISTPA, (2007) Analysis of Privacy Principals, pg. 64, [Online] http://www.istpa.org/ [Accessed Nov, 4 2010]

Landau, S., Le Van Gong, H., and Wilton, R., (2009) Achieving Privacy in a Federated Identity Management System. Financial Cryptography and Data Security 2009, International Financial Cryptography Association 1, 14.

NSTIC*(2010)* U.S. National Strategy for Trusted Identities in Cyberspace http://www.nstic.ideascale.com

OECD:  Rundle, M., et Al ( Bob Blakley, Jeff Broberg, Anthony Nadalin, Dale Olds, Mary Ruddy, Marcelo Thompson Mello Guimarães, and Paul Trevithick)   (2008) At a Crossroads: Personhood and Digital Identity in the Information Society, Published Organisation for Economic Cooperation and Development (OECD)

OECD, (1980) Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, [Online]  http://www.oecd.org/document/18/0,2340,en_2649_34255_1815186_1_1_1_1,00.html [Accessed April 1, 2011]

Privacy International(2010) Avoiding the Privacy Apocalypse, [Internet Video]  , Google Tech Talk, presented by Simon Davies and Gus Hosein

Reding, V, (Nov 4, 2010), European Commission sets out strategy to strengthen EU data protection rules, [Internet] http://europa.eu/rapid/pressReleasesAction.do?reference=IP/10/1462&format=HTML&aged=0&language=EN&guiLanguage=en  [Accessed Nov 4, 2010]

Scott David,  OIX Tool,  Oct 12 FIPP Tool.doc\

The Business Forum for Consumer Privacy, (2009) A Use and Obligation Approach to Protecting Privacy, [Online] http://www.huntonfiles.com/files/webupload/CIPL_Use_and_Obligations_White_Paper.pdf

US. Dep’t of Commerce, (2010) Privacy Green Paper,[Accessed Dec 18, 2010

Additional Reference in Notice Principle – Info RFC “draft-morris-policy-cons-00.txt“ [Internet] http://tools.ietf.org/html/draft-morris-policy-cons-00 [Accessed March 30, 2011]

\

  • No labels