{"id":344479,"date":"2024-10-20T00:11:42","date_gmt":"2024-10-20T00:11:42","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-tr-232442020\/"},"modified":"2024-10-25T23:34:15","modified_gmt":"2024-10-25T23:34:15","slug":"bsi-pd-iso-tr-232442020","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-tr-232442020\/","title":{"rendered":"BSI PD ISO\/TR 23244:2020"},"content":{"rendered":"
This document provides an overview of privacy and personally identifiable information (PII) protection as applied to blockchain and distributed ledger technologies (DLT) systems.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 5 Privacy framework for blockchain\/DLT systems 5.1 Overview 5.1.1 General <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5.1.2 Actors and roles 5.1.3 PII principals 5.1.4 PII controller 5.1.5 PII processor 5.2 Interactions 5.3 Recognizing PII 5.3.1 General <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5.4 Privacy safeguarding requirements 5.4.1 General 5.4.2 Legal and regulatory factors <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.4.3 Storage of PII on blockchain and DLT systems 5.4.4 Contractual factors <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.4.5 Business Factors 5.5 Privacy policies <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.6 Privacy controls 5.6.1 General <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.6.2 On-chain and off-chain PII data storage and privacy considerations <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.6.3 Privacy enhancing technologies applicable to blockchain and DLT Systems <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 5.7 Privacy and identity management 6 Privacy impact assessment 6.1 General 6.2 Privacy impact assessment as part of the overall risk management program 6.3 Privacy threats 6.4 Privacy vulnerabilities <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.5 Privacy consequences 6.6 Privacy risk mitigation strategies 7 Privacy management in blockchain and DLT 7.1 General 7.2 Personal information management systems 7.3 Change management <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 7.4 Monitoring, review and continuous improvement 7.5 PII principal awareness 7.6 Privacy-related complaint handling <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 7.7 Decommissioning 7.8 Regulatory and compliance aspects <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Blockchain and distributed ledger technologies. Privacy and personally identifiable information protection considerations<\/b><\/p>\n |