Table of Contents

 1     Scope          
 2     Normative references         
 3     Definitions and abbreviated terms 
        3.1     Definitions    
        3.2     Abbreviated terms    
 4     Overview  
        4.1     Objective for the protection of PII       
        4.2     Requirement for the protection of PII
        4.3     Controls         
        4.4     Selecting controls       
        4.5     Developing organization specific guidelines    
        4.6     Life cycle considerations         
        4.7     Structure of this Specification
 5     Information security policies             
        5.1     Management directions for information security          
 6     Organization of information security             
        6.1     Internal organization 
        6.2     Mobile devices and teleworking          
 7     Human resource security    
        7.1     Prior to employment
        7.2     During employment  
        7.3     Termination and change of employment         
 8     Asset management
        8.1     Responsibility for assets          
        8.2     Information classification        
        8.3     Media handling           
 9     Access control         
        9.1     Business requirement of access control            
        9.2     User access management       
        9.3     User responsibilities  
        9.4     System and application access control               
10     Cryptography         
       10.1     Cryptographic controls           
11     Physical and environmental security            
       11.1     Secure areas
       11.2     Equipment   
12     Operations security             
       12.1     Operational procedures and responsibilities 
       12.2     Protection from malware      
       12.3     Backup          
       12.4     Logging and monitoring          
       12.5     Control of operational software         
       12.6     Technical vulnerability management
       12.7     Information systems audit considerations      
13     Communications security  
       13.1     Network security management          
       13.2     Information transfer
14     System acquisition, development and maintenance              
       14.1     Security requirements of information systems             
       14.2     Security in development and support processes         
       14.3     Test data      
15     Supplier relationships         
       15.1     Information security in supplier relationships
       15.2     Supplier service delivery management            
16     Information security incident management
       16.1     Management of information security incidents and improvements     
17     Information security aspects of business continuity management   
       17.1     Information security continuity           
       17.2     Redundancies            
18     Compliance             
       18.1     Compliance with legal and contractual requirements
       18.2     Information security reviews
Annex A – Extended control set for PII protection (This annex forms an integral part of this Recommendation | International Standard.)    
        A.1     General          
        A.2     General policies for the use and protection of PII         
        A.3     Consent and choice   
        A.4     Purpose legitimacy and specification 
        A.5     Collection limitation  
        A.6     Data minimization      
        A.7     Use, retention and disclosure limitation            
        A.8     Accuracy and quality 
        A.9     Openness, transparency and notice   
       A.10     PII principal participation and access
       A.11     Accountability            
       A.12     Information security
       A.13     Privacy compliance  
Bibliography