1 Scope
2 References
3 Definitions
3.1
Terms defined elsewhere
3.2
Terms defined in this Recommendation
4 Abbreviations
and acronyms
5 Conventions
6 Overview
7 B2C
applications using tag-based identification
8 Reference
model for B2C applications using tag-based identification
9 PII
infringement in B2C applications using tag-based identification
9.1 Leakage of information associated with the identifier
9.2 Leakage of the
historical context data
9.3 Relationship between PII infringements and the reference model
10 PII
protection requirements for B2C applications using tag-based identification
10.1 Control of PII by ID tag user and/or ID terminal user
10.2 Authentication for ID tag user and/or ID terminal user
10.3 Access control to the PII of an ID tag user in an application server
10.4 Data confidentiality of information associated to an ID tag
10.5 Consent for collection of PII
10.6 Technical safeguards for the application servers
10.7 Relationship between requirements and
PII infringements
Annex A – Basic principles of
national application
Annex B
– Basic principles of international application: free
flow and legitimate restrictions
Appendix I – Location tracking by the identifier in
RFID services
Appendix II – PII protection service (PPS) for
applications using tag-based identification
II.1 PII protection service (PPS) for applications using tag-based
identification
II.2 Service entities of the PPS for applications using tag-based
identification
II.3 General service scenario for the PPS
II.4 Functions of the PPS
Bibliography