Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

Status: CANDIDATE

Optional comments about the requirement may be entered here

ItemDescription
Statement (Single phrase or sentence)Verifiers must attest their use-cases - which in turn defines the data they will need to collect and its retention policy
DescriptionVerifiers must share in a public forum which data elements they will collect and how they expect to retain and use the data.  This assertion should be associated with their form of identification. This will enable providers/users to understand in advance of any presentations what the implications of sharing are and ensure broader accountability.
Scope (applies to)
  • Part A: Verifiers
  • Part B: Issuers
  • Part C: Providers
Select the Primary Consideration
  • CC (Consent and Choice)
  • PL (Purpose legitimacy and specification)
  • CL (Collection limitation)
  • DM (Data minimization)
  • UR (Use, retention, and disclosure limitation)
  • AQ (Accuracy and quality)
  • OT (Openness, transparency, and access)
  • IA (Individual access & participation)
  • AC (Accountability)
  • IS (Information Security)
  • PS (Privacy compliance)
Other considerations
  • CC (Consent and Choice)
  • PL (Purpose legitimacy and specification)
  • CL (Collection limitation)
  • DM (Data minimization)
  • UR (Use, retention, and disclosure limitation)
  • AQ (Accuracy and quality)
  • OT (Openness, transparency, and access)
  • IA (Individual access & participation)
  • AC (Accountability)
  • IS (Information Security)
  • PS (Privacy compliance)
Select the Identifiers
  • Direct
  • Indirect
  • Unique
Reference (Scope_Consideration_Ref #)
Related Requirements
Explanatory Notes (Text or Link)

Reference

Privacy Principles

For descriptions see ISO/IEC 29100

#AbbreviationPrinciple
1CCConsent and Choice
2

PL

Purpose legitimacy and specification

3

CL

Collection limitation

4

DM

Data minimization

5

UR

Use, retention, and disclosure limitation

6

AQ

Accuracy and quality

7

OT

Openness, transparency, and access

8

IA

Individual access & participation

9

AC

Accountability

10

IS

Information Security

11

PS

Privacy compliance

  • No labels