PF Discovery

Resources and Attachments:

  File Modified

Microsoft Excel Sheet Privacy Framework Discovery v2(2).xls

Apr 14, 2011 by Former user

PDF File Draft Trust Framework-6.pdf

Apr 14, 2011 by Former user

Microsoft Excel Sheet Trust Framework Categorization v1.xls

Apr 14, 2011 by Former user

Microsoft Powerpoint 97 Slideshow Elements of a Trust Framework.ppt

Apr 14, 2011 by Former user

Microsoft Word 97 Document p3wg_privacy_framework_DRAFT-1.doc

Apr 14, 2011 by Former user

Privacy Principles:

Discovery Resources

Organization

Version

Framework/WG Name

Liaison

Type

Lexicon

Jurisdiction

Scope

Link

Summary

Status

Notes & Analysis

Kantara Initiative

 

P3 - Privacy Framework (PF) WG

 

Trust

 

 

 

PFWG

 

In development

 

ISO(drafts)

 

ISO 29100 Privacy Framework
ISO  29101 Privacy Reference Architecture
ISO 29190 Privacy Capability Framework

Collin Wallis

 

 

 

Global

 

KI can comment when ext review sub com page set up.  

29100 at FCD
29101 at CD1
29190 at 2ndWD and needs editor to take over RW's great work!

 

ITU-T

 

OIXa (200) Open Identity Trust Framework, [Online] http://openidentityexchange.org/sites/default/files/the-open-identity-trust-framework-model-2010-03.pdf [Accessed December 18, 2010]


 

 

 

 

 

 

 

 

ABA

 

Discussion Draft for Trust Framework

Tom S.

 

Y

 

 

 

 

Initial draft for comment

Includes example definitions

FTC-Trust Framework

 

FTC Staff Report (2010) A Proposed Framework For Businesses and Policy Makers, [Online] www.ftc.gov/os/2010/12/101201privacyreport.pdf [Accessed December 18, 2010]

 

 

 

 

 

 

 

 

 

ITU-T

 

Baseline identity management terms and
definitions 

 

 

 

 

 

 

 

T-REC-X.1252-201004-I!!PDF-E.pdf

 

References

(AICA/CICA) Summary of the HIPAA Privacy Rule --[Internet http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/index.html}

CIPL, 2010) Demonstrating and Measuring Accountability  A Discussion Document  http://www.huntonfiles.com/files/webupload/CIPL_Accountability_Phase_II_Paris_Project.PDF

COE (1980)  Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data (Council of Europe) http://www.privacy.org/pi/intl_orgs/coe/dp_convention_108.txt

DHS U.S. Department of Homeland Security, Privacy Policy Guidance Memorandum (2008) (Memo. 2008-1)http://www.dhs.gov/xlibrary/assets/privacy/privacy_policyguide_2008-01.pdf

FTC U.S. Federal Trade Commission http://www.ftc.gov/reports/privacy2000/privacy2000.pdf

HEW U.S. Department of Health Education and Welfare “Records, Computers and the Rights of Citizens” issued by the Secretary's Advisory Committee on Automated Personal Data Systems; Elliot Richardson, Secretary of the Department of Health, Education and Welfare (1973)

HHS U.S. Privacy Protection Study Commission “Protecting Privacy in an Information Society” (ch. 13). http://aspe.hhs.gov/datacncl/1977privacy/toc.htm

ICAM  U.S. Identity Credential and Access Management Trust Framework Provider Adoption Process (TFPAP) For Levels of Assurance 1, 2, and Non-PKI 3, Version 1.0.1, Release Candidate September 4, 2009http://www.idmanagement.gov/documents/TrustFrameworkProviderAdoptionProcess.pd

ISTPA, (2007) Analysis of Privacy Principals, pg. 64, [Online] http://www.istpa.org/ [Accessed Nov, 4 2010]

Landau, S., Le Van Gong, H., and Wilton, R., (2009) Achieving Privacy in a Federated Identity Management System. Financial Cryptography and Data Security 2009, International Financial Cryptography Association 1, 14.

NSTIC*(2010)* U.S. National Strategy for Trusted Identities in Cyberspace http://www.nstic.ideascale.com

OECD:  Rundle, M., et Al ( Bob Blakley, Jeff Broberg, Anthony Nadalin, Dale Olds, Mary Ruddy, Marcelo Thompson Mello Guimarães, and Paul Trevithick)   (2008) At a Crossroads: Personhood and Digital Identity in the Information Society, Published Organisation for Economic Cooperation and Development (OECD)

OECD, (1980) Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, [Online]  http://www.oecd.org/document/18/0,2340,en_2649_34255_1815186_1_1_1_1,00.html [Accessed April 1, 2011]

Privacy International(2010) Avoiding the Privacy Apocalypse, [Internet Video]  , Google Tech Talk, presented by Simon Davies and Gus Hosein

Reding, V, (Nov 4, 2010), European Commission sets out strategy to strengthen EU data protection rules, [Internet] http://europa.eu/rapid/pressReleasesAction.do?reference=IP/10/1462&format=HTML&aged=0&language=EN&guiLanguage=en  [Accessed Nov 4, 2010]

Scott David,  OIX Tool,  Oct 12 FIPP Tool.doc\

The Business Forum for Consumer Privacy, (2009) A Use and Obligation Approach to Protecting Privacy, [Online] http://www.huntonfiles.com/files/webupload/CIPL_Use_and_Obligations_White_Paper.pdf

US. Dep’t of Commerce, (2010) Privacy Green Paper,[Accessed Dec 18, 2010

Additional Reference in Notice Principle – Info RFC “draft-morris-policy-cons-00.txt“ [Internet] http://tools.ietf.org/html/draft-morris-policy-cons-00 [Accessed March 30, 2011]

\