ANCR WG Minutes 20240522
Â
Agenda
Roll Call
@Salvatore D'Agostino
@Mark Lizar
Tim L
Voting
Â
Non-voting
Â
Other
IPR Statement
Proposed Agenda
Â
Updates and Agenda items
Consensus Protocol and Roadmap on agenda for constant iteration in the c
PIVMan v3 is out with FIPS
1 slide for Kantara @ Identiverse - which is next week
Blog Post
digital transparency standards
whats s inthe wiki
goal is to show how digital transparency can be used to see
emerying see valid consent in the public digital commons
0PN Commons summer project to implement ANCR - with a Transparency Index. ,
using the TPS Indicators, so it can be demonstrated to legislators and policy makers co-reguation
showcasing what digital transparency is and how policy should be legislated.
Â
Time | Â | Â | Actions |
---|---|---|---|
15 | Admin | Motions | Â |
15 | TPI - Conformance Program Roadmap | Â |
|
10 | TPi - Code of Conduct | Â | Â |
20 | ANCR-ROPA Framework | Â | Â |
Article 33
Security of processing
Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risks of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including, inter alia, as appropriate:
(a) Â the pseudonymisation and encryption of personal data;
(b) Â the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services;
(c) Â the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident;
(d) Â a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing.
In assessing the appropriate level of security account shall be taken in particular of the risks that are presented by processing, in particular from accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to personal data transmitted, stored or otherwise processed.
The controller and processor shall take steps to ensure that any natural person acting under the authority of the controller or the processor who has access to personal data does not process them except on instructions from the controller, unless he or she is required to do so by Union law.
Adherence to an approved certification mechanism as referred to in Article 42 of Regulation (EU) 2016/679 may be used as an element by which to demonstrate compliance with the requirements set out in paragraph 1 of this Article.