CONTENTS

 

 1     Scope 
 2     References 
 3     Definitions  
        3.1     Terms defined elsewhere    
        3.2     Terms defined in this Recommendation       
 4     Abbreviations and acronyms        
 5     Conventions     
 6     Overview   
 7     B2C applications using tag-based identification     
 8     Reference model for B2C applications using tag-based identification         
 9     PII infringement in B2C applications using tag-based identification 
        9.1     Leakage of information associated with the identifier           
        9.2     Leakage of the historical context data         
        9.3     Relationship between PII infringements and the reference model      
10     PII protection requirements for B2C applications using tag-based identification    
       10.1     Control of PII by ID tag user and/or ID terminal user         
       10.2     Authentication for ID tag user and/or ID terminal user        
       10.3     Access control to the PII of an ID tag user in an application server 
       10.4     Data confidentiality of information associated to an ID tag  
       10.5     Consent for collection of PII         
       10.6     Technical safeguards for the application servers     
       10.7     Relationship between requirements and PII infringements   
Annex A – Basic principles of national application     
Annex BBasic principles of international application: free flow and legitimate restrictions     
Appendix I – Location tracking by the identifier in RFID services     
Appendix II – PII protection service (PPS) for applications using tag-based identification     
       II.1     PII protection service (PPS) for applications using tag-based identification   
       II.2     Service entities of the PPS for applications using tag-based identification      
       II.3     General service scenario for the PPS          
       II.4     Functions of the PPS          
Bibliography