Information technology - Security techniques - Code of practice for personally identifiable information protection |
 |
The number of organizations processing personally identifiable information (PII) is increasing, as is the amount of PII that these organizations deal with. At the same time, societal expectations for the protection of PII and the security of data relating to individuals are also increasing. A number of countries are augmenting their laws to address the increased number of high profile data breaches.
This document establishes control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII). In particular, this document specifies guidelines based on ISO/IEC 27002, taking into consideration the requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).
|
|
Citation: |
https://handle.itu.int/11.1002/1000/13182 |
Series title: |
X series: Data networks, open system communications and security X.1000-X.1099: Information and network security X.1050-X.1069: Security management |
Approval date: |
2017-03-30 |
Identical standard: | ISO/IEC 29151:2018 (Common) |
Provisional name: | X.gpim |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1058 (03/2017)
|
In force
|
here
|
here
|
here
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
X Suppl. 32 (03/2018)
|
ITU-T X.1058 - Supplement on code of practice for personally identifiable information (PII) protection for telecommunication organizations
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|