Page 85 - Big data - Concept and application for telecommunications
P. 85

2                                Big data - Concept and application for telecommunications                       2


            8.6     Requirements for data rights management

            Data rights management requirements include:
            1)      it is required that DP:data supplier supports the deletion of datasets when the data ownerships is
                    transferred;
            2)      it  is  required  that  BDSP  supports  the  deletion  of  data  when  the  ownerships  of  a  data  were
                    transferred to BDC;
            3)      it is recommended that DP:data broker supports registration of the data rights with metadata;
                    NOTE  1  –  Data  rights  contains  information  of  general  agreement,  copyrights,  patents,  licenses
                    policies and pricing policies.
            4)      it is recommended that DP:data broker supports search of data rights;
            5)      it is recommended that BDSP supports the storage for metadata as well as data rights.
                    NOTE  2  –  Data  rights  contains  information  of  general  agreement,  copyrights,  patents,  licenses
                    policies and pricing policies.

            8.7     Requirements for management of personal information

            Personal information management requirements include:
            1)      it  is  required  that  BDSP  supports  deletion  customer's  data  by  the  policy  when  the  service  is
                    terminated;
                    NOTE – Customer's data includes source data, result data, and applied analytical methods, etc.
            2)      it is required that BDSP supports data de-identification based on personal information management
                    policy.


            9       Security considerations
            Relevant security requirements of [b-ITU-T Y.2201], [b-ITU-T Y.2701] and applicable X, Y and M series of ITU-T
            Recommendations  need  to  be  taken  into  consideration,  including  access  control,  authentication,  data
            confidentiality, data retention policy, network security, data integrity, availability and protection of personal
            information.






































                                                            Moving data – Data exchange and data flow      77
   80   81   82   83   84   85   86   87   88   89   90